This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Weiterlesen
Delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework ...
Weiterlesen
Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
Weiterlesen
This book constitutes the refereed proceedings of the 13th International Conference on the Quality of Information and Communications ...
Weiterlesen
Although the quality of a system’s software architecture is one of the critical factors in its overall quality, the architecture ...
Weiterlesen
While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography ...
Weiterlesen
Recently, the field of quantum computation and information has been developing through a fusion of results from various research ...
Weiterlesen
This bookis based on some of the lectures duringthe Paci?c Institute of Theoretical Physics (PITP) summer school on “Quantum ...
Weiterlesen
The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...
Weiterlesen
This book about The "NATO Advanced Research Workshop on radiation detectors for medical imaging" The talks of 14 keynote ...
Weiterlesen
Most small businesses cite lack of capital is a major constraint on growth. Raising Capital focuses on non-bank sources of ...
Weiterlesen
The book exemplifies such interdisciplinary work. Thus, some new derivatives have been prepared by chemists and consecutively ...
WeiterlesenAs the number of thefts and identity fraud has become a serious issue and with the increase of accidents rate, and the need ...
Weiterlesen
This book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, ...
Weiterlesen
This book addresses all aspects of negotiation mechanisms in multi-agent systems, including Multi-Issue Negotiations, Concurrent ...
Weiterlesen
A study of Islamic architecture in Anatolia following the Mongol conquest in 1243. Complex shifts in rule, movements of population, ...
Weiterlesen
The purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...
Weiterlesen
The purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...
Weiterlesen
Topics covered by the Workshop include recent theoretical and experi mental developments on environmental adsorption, adsorption ...
Weiterlesen
Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...
Weiterlesen