Electronic Books

Total Books: 1 - 16 /16
978-1-4020-6078-6
By-catch Reduction in the Worlds Fisheries

This book comes after several decades of outstanding and successful research that has helped ameliorate some of the most ...

Continue reading
978-0-387-25088-5
Certification and Security in Inter-Organizational E-Services

This collection of papers offers real-life application experiences, research results and methodological proposals of direct ...

Continue reading
978-0-387-24486-0
Communications and Multimedia Security (vol. # 175)

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...

Continue reading
978-3-540-30569-9
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3362)

History based access control and secure information flow The spec# programming system Mastering test generation from smart ...

Continue reading
978-3-540-31936-8
Foundations of Security Analysis and Design III

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...

Continue reading
978-3-540-74810-6
Foundations of Security Analysis and Design IV

This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...

Continue reading
978-3-8348-9195-2
ISSE 2006 — Securing Electronic Busines Processes

This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...

Continue reading
978-3-8348-9418-2
ISSE/SECURE 2007 Securing Electronic Business Processes

This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...

Continue reading
978-3-540-72354-7
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...

Continue reading
978-3-540-79078-5
Memories in Wireless Systems

This book is a guide which treats many components used in mobile communications, and in particular focuses on non-volatile ...

Continue reading
978-0-387-38162-6
Power Analysis Attacks

This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...

Continue reading
978-1-56898-665-4
Real Photo Postcards

Real Photo Postcards is a collection of the most outlandish and idiosyncratic, beautiful and even occasionally bizarre images ...

Continue reading
978-0-387-69933-2
Securing Biometrics Applications

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...

Continue reading
978-3-540-32004-3
Security in Pervasive Computing (vol. # 3450)

The objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...

Continue reading
978-3-540-33312-8
Smart Card Research and Advanced Applications

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...

Continue reading
978-0-387-72198-9
Smart Cards, Tokens, Security and Applications

This book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...

Continue reading
Total Books: 1 - 16 /16