Electronic Books

Total Books: 1 - 16 /16
By-catch Reduction in the Worlds Fisheries

This book comes after several decades of outstanding and successful research that has helped ameliorate some of the most ...

Lire la suite
Certification and Security in Inter-Organizational E-Services

This collection of papers offers real-life application experiences, research results and methodological proposals of direct ...

Lire la suite
Communications and Multimedia Security (vol. # 175)

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...

Lire la suite
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3362)

History based access control and secure information flow The spec# programming system Mastering test generation from smart ...

Lire la suite
Foundations of Security Analysis and Design III

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...

Lire la suite
Foundations of Security Analysis and Design IV

This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...

Lire la suite
ISSE 2006 — Securing Electronic Busines Processes

This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...

Lire la suite
ISSE/SECURE 2007 Securing Electronic Business Processes

This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...

Lire la suite
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...

Lire la suite
Memories in Wireless Systems

This book is a guide which treats many components used in mobile communications, and in particular focuses on non-volatile ...

Lire la suite
Power Analysis Attacks

This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...

Lire la suite
Real Photo Postcards

Real Photo Postcards is a collection of the most outlandish and idiosyncratic, beautiful and even occasionally bizarre images ...

Lire la suite
Securing Biometrics Applications

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...

Lire la suite
Security in Pervasive Computing (vol. # 3450)

The objective of this second conference was to develop new security concepts for complex application scenarios based on systems ...

Lire la suite
Smart Card Research and Advanced Applications

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...

Lire la suite
Smart Cards, Tokens, Security and Applications

This book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...

Lire la suite
Total Books: 1 - 16 /16