Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
اقرأ المزيد
the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
اقرأ المزيد
Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
اقرأ المزيد
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks presents the latest research results ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc ...
اقرأ المزيد
Up to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. ...
اقرأ المزيد
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
اقرأ المزيد
Securities Industry Essentials Exam 2023-2024 For Dummies is this year’s definitive study guide for prospective securities ...
اقرأ المزيد
" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...
اقرأ المزيد
This book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...
اقرأ المزيد
Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, ...
اقرأ المزيد
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...
اقرأ المزيد
Security in E-Learning is organized in three parts. Emphasizes that security is mainly an organizational and management issue. ...
اقرأ المزيد
This book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
اقرأ المزيد
Recent reviews indicate the existence of significant vulnerabilities of all components of the infrastructure in general, ...
اقرأ المزيد
combines essential theory with "how-to" technical instruction to help you master basic techniques in dental sedation and ...
اقرأ المزيد
Epileptic events are now known to occur more frequently in the intensive care unit (ICU) than previously thought, a situation ...
اقرأ المزيد
This volume of selected papers is A Statistical Model: Frederick Mosteller's Contributions to Statistics, Science, and Public ...
اقرأ المزيد
A major challenge in the modeling and simulation of tumor growth is the mathematical description of living matter, which ...
اقرأ المزيد