This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
اقرأ المزيدThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيدThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيدThis book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
اقرأ المزيدThe purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
اقرأ المزيدThis book constitutes the refereed proceedings of the International Conference on Computer Vision and Graphics, ICCVG 2020, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 20th International Symposium on Computer and Information Sciences, ...
اقرأ المزيدThis book constitutes revised selected papers of the Second International Conference on Computing Science, Communication ...
اقرأ المزيدZero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly ...
اقرأ المزيدConstituents of Modern System-safety Thinking contains the invited papers presented at the Thirteenth annual Safety-critical ...
اقرأ المزيدThis book constitutes the refereed proceedings of the workshops of the First European Conference on Ambient Intelligence, ...
اقرأ المزيدHistory based access control and secure information flow The spec# programming system Mastering test generation from smart ...
اقرأ المزيدThis book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...
اقرأ المزيدThis book constitutes the proceedings of the 17th International Conference on Cooperative Design, Visualization, and Engineering, ...
اقرأ المزيدThe definitive guide to writing robust, maintainable code. Whatever version of Java you are using—up to and including Java ...
اقرأ المزيدThe book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel ...
اقرأ المزيدThis volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
اقرأ المزيدStarting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...
اقرأ المزيدStarting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...
اقرأ المزيدPrevention and preparedness are the two basic approaches to maximize food security against any sort of tampering, whether ...
اقرأ المزيد