Electronic Books

Total Books: 21 - 35 /35
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

Lee mas
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

Lee mas
Policies and Research in Identity Management : First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
Pro SQL Server 2008 Reporting Services

Take full advantage of everything SQL Server 2008 Reporting Services has to offer and deliver customizable, web–enabled ...

Lee mas
Progress in WWW Research and Development : 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings

This book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...

Lee mas
Securing Biometrics Applications

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...

Lee mas
Security for Telecommunications Networks

Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...

Lee mas
Security of Networks and Services in an All-Connected World

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...

Lee mas
Smart Cards, Tokens, Security and Applications

This book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...

Lee mas
Survey of Text Mining II : Clustering, Classification, and Retrieval

This volume continues to survey the evolving field of text mining - the application of techniques of machine learning, in ...

Lee mas
The Everyday Life of an Algorithm

This book begins with an algorithm–a set of IF…THEN rules used in the development of a new, ethical, video surveillance ...

Lee mas
The Modern Algebra of Information Retrieval

This book takes a unique approach to information retrieval by laying down the foundations for a modern algebra of information ...

Lee mas
Trust Management II : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

Lee mas
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

Lee mas
VizSEC 2007 : Proceedings of the Workshop on Visualization for Computer Security

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...

Lee mas
Total Books: 21 - 35 /35