This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
Lire la suiteTraditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...
Lire la suiteThe papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...
Lire la suiteConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Lire la suiteThis book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Lire la suiteDescribes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with ...
Lire la suiteWindows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft ...
Lire la suite