This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Continue readingThe 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
Continue readingThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
Continue readingISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...
Continue readingJDBC Metadata, MySQL, and Oracle Recipes is the only book that focuses on metadata or annotation-based code recipes for JDBC ...
Continue readingThis exceptional book explains fundamentals in detail, supported by realistic examples, while most other books on the market ...
Continue readingOracle Applications DBA Field Guide provides scripts, notes, guidelines, and references to guide you safely through the crucial ...
Continue readingOracle Database 11g : New Features for DBAs and Developers is a comprehensive, example–laden review of the most significant ...
Continue readingApplication Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...
Continue readingReal Application Clusters (RAC) and the Grid architecture are Oracle's strategy for scaling out enterprise systems to cope ...
Continue readingPro Oracle Spatial for Oracle Database 11g shows how to take advantage of Oracle Databases built–in feature set for working ...
Continue readingThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
Continue readingThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingThis book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue readingThis book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue readingThe main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...
Continue readingConstitutes the thoroughly refereed post-proceedings of the First International Conference on Test and Proofs, TAP 2007, ...
Continue readingThis book covers the area of convergence of software proofing and testing and feature current research work that combines ...
Continue readingThe Definitive Guide to SOA: Oracle® Service Bus, Second Edition targets professional software developers and architects ...
Continue reading