Electronic Books

Total Books: 21 - 40 /114
CryptoGraphics

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...

Lire la suite
Cryptographic Hardware and Embedded Systems - CHES 2006

These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...

Lire la suite
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

Lire la suite
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

Lire la suite
Cryptology and Network Security

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...

Lire la suite
Data Security : Technical and Organizational Protection Measures against Data Loss and Computer Crime / Thomas H. Lenhard

Offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...

Lire la suite
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

Lire la suite
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

Lire la suite
EU-Turkey Relations Theories, Institutions, and Policies

This book explores the new complexities and ambiguities that epitomize EU-Turkey relations. With a strong focus on the developments ...

Lire la suite
Economics, Sustainability, and Natural Resources

The economics of sustainability is much more complex than the neoclassical (Newtonian) economic approach to economic efficiency. ...

Lire la suite
Emerging States at Crossroads

This volume analyzes the economic, social, and political challenges that emerging states confront today. Notwithstanding ...

Lire la suite
Error-Correction Coding and Decoding

This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting ...

Lire la suite
Evolution, Monitoring and Predicting Models of Rockburst

This open access book focuses on investigating predicting precursor information and key points of rockburst in mining engineering ...

Lire la suite
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

Lire la suite
Human-Computer Interaction. Interaction Platforms and Techniques

The 12th International Conference on Human-Computer Interaction, HCI Inter- tional 2007, was held in Beijing, P.R. This volume, ...

Lire la suite
IT Security Controls : A Guide to Corporate Standards and Frameworks / Virgilio Viegas, Oben Kuyucu

Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...

Lire la suite
Implementing Responsible Research and Innovation Organisational and National Conditions

we give an overview of the book and the RRI-Practice study. The book is an analysis of data collected in the RRI-Practice ...

Lire la suite
Information Security (vol. # 3650)

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place ...

Lire la suite
Information Security Applications

This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...

Lire la suite
Information Security Applications (vol. # 3325)

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...

Lire la suite
Total Books: 21 - 40 /114