Electronic Books

Total Books: 61 - 80 /255
Critical Information Infrastructures

Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...

Weiterlesen
Cryptographic Hardware and Embedded Systems - CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...

Weiterlesen
Cryptography in C and C++

This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second ...

Weiterlesen
Cryptology and Network Security

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...

Weiterlesen
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

Weiterlesen
Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers

This book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...

Weiterlesen
NoIMG
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20–21, 2021, Revised Selected Papers

This book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...

Weiterlesen
Cyber Security : Critical Infrastructure Protection / Martti Lehto, Pekka Neittaanmäki

Part 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...

Weiterlesen
Cyber Security ; 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers

This book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...

Weiterlesen
NoIMG
Cybersecurity of Digital Service Chains : Challenges, Methodologies, and Tools

This book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...

Weiterlesen
Data Management Technologies and Applications : 8th International Conference, DATA 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers

This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Data Management Technologies ...

Weiterlesen
Data Mining

This book on data mining details the unique steps of the knowledge discovery process that prescribe the sequence in which ...

Weiterlesen
Data Mining

This book on data mining details the unique steps of the knowledge discovery process that prescribe the sequence in which ...

Weiterlesen
Data Security : Technical and Organizational Protection Measures against Data Loss and Computer Crime / Thomas H. Lenhard

Offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...

Weiterlesen
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

Weiterlesen
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

Weiterlesen
Data and Applications Security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...

Weiterlesen
Data and Applications Security and Privacy XXXIV : 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings

This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...

Weiterlesen
Database and Expert Systems Applications

This volume constitutes the refereed proceedings of the three workshops held at the 31st International Conference on Database ...

Weiterlesen
Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment

The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities ...

Weiterlesen
Total Books: 61 - 80 /255