This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
Lire la suiteThe 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...
Lire la suiteThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
Lire la suiteISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...
Lire la suiteJDBC Metadata, MySQL, and Oracle Recipes is the only book that focuses on metadata or annotation-based code recipes for JDBC ...
Lire la suiteThis exceptional book explains fundamentals in detail, supported by realistic examples, while most other books on the market ...
Lire la suiteOracle Applications DBA Field Guide provides scripts, notes, guidelines, and references to guide you safely through the crucial ...
Lire la suiteOracle Database 11g : New Features for DBAs and Developers is a comprehensive, example–laden review of the most significant ...
Lire la suiteApplication Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...
Lire la suiteReal Application Clusters (RAC) and the Grid architecture are Oracle's strategy for scaling out enterprise systems to cope ...
Lire la suitePro Oracle Spatial for Oracle Database 11g shows how to take advantage of Oracle Databases built–in feature set for working ...
Lire la suiteThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
Lire la suiteThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Lire la suiteThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suiteThis book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Lire la suiteThis book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Lire la suiteThe main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...
Lire la suiteConstitutes the thoroughly refereed post-proceedings of the First International Conference on Test and Proofs, TAP 2007, ...
Lire la suiteThis book covers the area of convergence of software proofing and testing and feature current research work that combines ...
Lire la suiteThe Definitive Guide to SOA: Oracle® Service Bus, Second Edition targets professional software developers and architects ...
Lire la suite