The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
اقرأ المزيد
                The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
اقرأ المزيد
                This collection of papers offers real-life application experiences, research results and methodological proposals of direct ...
اقرأ المزيد
                As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
اقرأ المزيد
                This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
اقرأ المزيد
                Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...
اقرأ المزيد
                Offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...
اقرأ المزيد
                Constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...
اقرأ المزيد
                Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
اقرأ المزيد
                This book is an in-depth learning and teaching resource for the understanding and programming of TCP/IP networking in Java. ...
اقرأ المزيد
                Guide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks ...
اقرأ المزيد
                Hardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
اقرأ المزيد
                Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
اقرأ المزيد
                Sٍheds new light on defense alert systems against computer and network intrusions. It also covers integrating intrusion ...
اقرأ المزيد
                INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
اقرأ المزيد
                The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one way or another, addresses ...
اقرأ المزيد
                This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...
اقرأ المزيد
                Provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s ...
اقرأ المزيد
                The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيد
                Practical Internet Security, a professional book, reveals how the Internet is paving the way for secure communications within ...
اقرأ المزيد