Electronic Books

Total Books: 61 - 80 /112
Information Security and Cryptology – ICISC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...

Lee mas
Information Security and Privacy

A Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP ...

Lee mas
Information Security and Privacy

The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...

Lee mas
Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...

Lee mas
Information Security and Privacy (vol. # 3574)

Constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...

Lee mas
Information Security and Privacy (vol. # 4058)

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...

Lee mas
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

Lee mas
Information Security, Practice and Experience

ISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...

Lee mas
Information and Communications Security

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...

Lee mas
Information and Communications Security (vol. # 3783)

The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. ...

Lee mas
Intelligence and Security Informatics

Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information ...

Lee mas
Intelligence and Security Informatics (vol. # 3495)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

Lee mas
Introduction to Cryptography

In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital ...

Lee mas
Introduction to Machine Learning with Applications in Information Security / Mark Stamp

Provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...

Lee mas
Machine Learning for Cyber Agents : Attack and Defence / Stanislav Abaimov, Maurizio Martellini

The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...

Lee mas
NoIMG
Managing Risk and Information Security : Protect to Enable

This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes ...

Lee mas
Managing Risk and Information Security : Protect to Enable

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on ...

Lee mas
NoIMG
Messages security application / Bilal Al-Hamwia ; Kinan Al-Awa ; Rama Al-Hamwi ; Shiraz Naji ; Abd Al-Hadi Nofal

The rapid development of communication technology, is bringing many technological conveniences with it and simplifying our ...

Lee mas
Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems) /

Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...

Lee mas
Multivariate Public Key Cryptosystems

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...

Lee mas
Total Books: 61 - 80 /112