This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Lee masThe 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
Lee masThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
Lee masISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...
Lee masJDBC Metadata, MySQL, and Oracle Recipes is the only book that focuses on metadata or annotation-based code recipes for JDBC ...
Lee masThis exceptional book explains fundamentals in detail, supported by realistic examples, while most other books on the market ...
Lee masOracle Applications DBA Field Guide provides scripts, notes, guidelines, and references to guide you safely through the crucial ...
Lee masOracle Database 11g : New Features for DBAs and Developers is a comprehensive, example–laden review of the most significant ...
Lee masApplication Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...
Lee masReal Application Clusters (RAC) and the Grid architecture are Oracle's strategy for scaling out enterprise systems to cope ...
Lee masPro Oracle Spatial for Oracle Database 11g shows how to take advantage of Oracle Databases built–in feature set for working ...
Lee masThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
Lee masThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Lee masThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee masThis book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Lee masThis book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Lee masThe main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...
Lee masConstitutes the thoroughly refereed post-proceedings of the First International Conference on Test and Proofs, TAP 2007, ...
Lee masThis book covers the area of convergence of software proofing and testing and feature current research work that combines ...
Lee masThe Definitive Guide to SOA: Oracle® Service Bus, Second Edition targets professional software developers and architects ...
Lee mas