Electronic Books

Total Books: 21 - 35 /35
978-3-540-68351-3
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

Continue reading
978-3-540-85538-5
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

Continue reading
978-0-387-77996-6
Policies and Research in Identity Management : First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Continue reading
978-1-4302-0651-4
Pro SQL Server 2008 Reporting Services

Take full advantage of everything SQL Server 2008 Reporting Services has to offer and deliver customizable, web–enabled ...

Continue reading
978-3-540-78849-2
Progress in WWW Research and Development : 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings

This book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...

Continue reading
978-0-387-69933-2
Securing Biometrics Applications

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...

Continue reading
978-0-387-72442-3
Security for Telecommunications Networks

Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...

Continue reading
978-3-319-60774-0
Security of Networks and Services in an All-Connected World

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...

Continue reading
978-0-387-72198-9
Smart Cards, Tokens, Security and Applications

This book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...

Continue reading
978-1-84800-046-9
Survey of Text Mining II : Clustering, Classification, and Retrieval

This volume continues to survey the evolving field of text mining - the application of techniques of machine learning, in ...

Continue reading
978-3-030-00578-8
The Everyday Life of an Algorithm

This book begins with an algorithm–a set of IF…THEN rules used in the development of a new, ethical, video surveillance ...

Continue reading
978-3-540-77659-8
The Modern Algebra of Information Retrieval

This book takes a unique approach to information retrieval by laying down the foundations for a modern algebra of information ...

Continue reading
978-0-387-09428-1
Trust Management II : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

Continue reading
978-3-540-85933-8
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

Continue reading
978-3-540-78243-8
VizSEC 2007 : Proceedings of the Workshop on Visualization for Computer Security

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...

Continue reading
Total Books: 21 - 35 /35