Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art ...
Continue readingThis book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...
Continue readingThis book constitutes the refereed proceedings of the 8th Asia-Pacific Web Conference, APWeb 2006, held in Harbin, China ...
Continue readingThis book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...
Continue readingThis book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...
Continue readingThis book focuses on the discrepancies in biobank research regulations that are among the most significant hurdles to effective ...
Continue readingThis Handbook presents a comprehensive and rigorous overview of the state-of-the-art on Smart Cities. It provides the reader ...
Continue readingThis timely book addresses the conflict between globalism and nationalism. It provides a liberal communitarian response to ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingThis book cover topics such as: e-health technology design; well-being technology; biomedical and health informatics; and ...
Continue readingThis book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...
Continue readingThis book is part of a two-volume work that constitutes the refereed proceedings of the 11th IFIP TC13 International Conference ...
Continue readingThis book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...
Continue readingThis book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Continue readingThis book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...
Continue readingInference control in statistical databases, also known as statistical disclosure limitation or statistical confidentiality, ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Continue readingThis book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...
Continue readingThe 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...
Continue readingComplete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...
Continue reading