Electronic Books

Total Books: 1 - 16 /16
By-catch Reduction in the Worlds Fisheries

This book comes after several decades of outstanding and successful research that has helped ameliorate some of the most ...

Lee mas
Certification and Security in Inter-Organizational E-Services

This collection of papers offers real-life application experiences, research results and methodological proposals of direct ...

Lee mas
Communications and Multimedia Security (vol. # 175)

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...

Lee mas
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3362)

History based access control and secure information flow The spec# programming system Mastering test generation from smart ...

Lee mas
Foundations of Security Analysis and Design III

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...

Lee mas
Foundations of Security Analysis and Design IV

This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...

Lee mas
ISSE 2006 — Securing Electronic Busines Processes

This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...

Lee mas
ISSE/SECURE 2007 Securing Electronic Business Processes

This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...

Lee mas
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...

Lee mas
Memories in Wireless Systems

This book is a guide which treats many components used in mobile communications, and in particular focuses on non-volatile ...

Lee mas
Power Analysis Attacks

This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...

Lee mas
Real Photo Postcards

Real Photo Postcards is a collection of the most outlandish and idiosyncratic, beautiful and even occasionally bizarre images ...

Lee mas
Securing Biometrics Applications

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...

Lee mas
Security in Pervasive Computing (vol. # 3450)

The objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...

Lee mas
Smart Card Research and Advanced Applications

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...

Lee mas
Smart Cards, Tokens, Security and Applications

This book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...

Lee mas
Total Books: 1 - 16 /16