Includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction ...
WeiterlesenA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
WeiterlesenConstitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...
WeiterlesenThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
WeiterlesenThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
WeiterlesenConstitutes a valuable, concise and up-to-date guide for the materials and life science community interested in cellulose ...
WeiterlesenThe chapters selected for this book consist of studies in which culture has been either the object, or the structuring principle ...
WeiterlesenThis volume brings together diverse contributions from leading archaeologists and paleoanthropologists, covering various ...
WeiterlesenThis book contains variety of subjects in modern high performance computing and its applications, such as numerical and ...
WeiterlesenThis volume is covering many topics in control theory and several different applications. The variety of their research is ...
WeiterlesenThis volume is covering many topics in control theory and several different applications. The variety of their research is ...
WeiterlesenThe development of product innovations is permanently challenged by the customers’ rapidly evolving demand for new products ...
WeiterlesenJanine Frauendorf analyzes how customer processes can be used to optimize the overall service process. In this context, the ...
WeiterlesenThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
WeiterlesenPart 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
WeiterlesenFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
WeiterlesenThis book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
WeiterlesenIn this concise yet comprehensive textbook, future inventors are introduced to the key concepts of Cyber-Physical Systems ...
WeiterlesenThis monograph, divided into four parts, presents a comprehensive treatment and systematic examination of cycle spaces of ...
WeiterlesenThis monograph, divided into four parts, presents a comprehensive treatment and systematic examination of cycle spaces of ...
Weiterlesen