Electronic Books

Total Books: 41 - 60 /117
Digital Rights Management

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...

Weiterlesen
Digital Watermarking : 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in ...

Weiterlesen
Economics of Identity Theft

This book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...

Weiterlesen
Economics of Identity Theft

This book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...

Weiterlesen
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

Weiterlesen
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

Weiterlesen
Fast Software Encryption (vol. # 3557)

The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...

Weiterlesen
Fast Software Encryption (vol. # 4047)

Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...

Weiterlesen
Fast Software Encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

Constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...

Weiterlesen
Financial Cryptography and Data Security : 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...

Weiterlesen
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Weiterlesen
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Weiterlesen
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Weiterlesen
Foundations of Computer Security

Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...

Weiterlesen
High Performance Computing for Computational Science - VECPAR 2008 : 8th International Conference, Toulouse, France, June 24-27, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on High Performance ...

Weiterlesen
IT Security Controls : A Guide to Corporate Standards and Frameworks / Virgilio Viegas, Oben Kuyucu

Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...

Weiterlesen
Image Analysis and Recognition : 5th International Conference, ICIAR 2008, Póvoa de Varzim, Portugal, June 25-27, 2008. Proceedings

The 110 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 226 submissions. ...

Weiterlesen
Image and Video Encryption

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges ...

Weiterlesen
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

Weiterlesen
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

Weiterlesen
Total Books: 41 - 60 /117