Electronic Books

Total Books: 41 - 60 /98
Fast Software Encryption (vol. # 4047)

Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...

Weiterlesen
Fast Software Encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

Constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...

Weiterlesen
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Weiterlesen
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Weiterlesen
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

Weiterlesen
Foundations of Computer Security

Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...

Weiterlesen
High Performance Computing for Computational Science - VECPAR 2008 : 8th International Conference, Toulouse, France, June 24-27, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on High Performance ...

Weiterlesen
IT Security Controls : A Guide to Corporate Standards and Frameworks / Virgilio Viegas, Oben Kuyucu

Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...

Weiterlesen
Image and Video Encryption

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges ...

Weiterlesen
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

Weiterlesen
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

Weiterlesen
Information Hiding (vol. # 3727)

Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...

Weiterlesen
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

Weiterlesen
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

Weiterlesen
Information Security and Cryptology - ICISC 2005

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...

Weiterlesen
Information Security and Cryptology - ICISC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...

Weiterlesen
Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...

Weiterlesen
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

Weiterlesen
Information Systems Security

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...

Weiterlesen
Information Systems Security (vol. # 3803)

The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...

Weiterlesen
Total Books: 41 - 60 /98