Free Delivery Over $100
3736 books were found.
Constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security,... Read More >>
Read More >>
Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and pseudo code, which... Read More >>
This book presents the basics of coding theory needed to understand the application to memories, as well as the... Read More >>
This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Workshop: Theory and... Read More >>
Posthum erscheint dieses klassische Lehr- und Referenzwerk von dem Pionier der Digitalen Signalverarbeitung in der... Read More >>
Auflage baut auf den Vorauflagen aus den 90er Jahren auf, die schon die Audio- und Videoübertragungstechniken für... Read More >>
This professional book covers almost all known cryptanalytic attacks and defenses of the RSA cryptographic system... Read More >>
The capability of MNCs to create, transfer and combine knowledge from different locations is an important determinant... Read More >>
The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties... Read More >>
Objektorientiertes Programmieren mit Java - in der neuen Version 6: Systematisch, gründlich und Schritt für Schritt... Read More >>
The probability propagation algorithm is proven in c- junctionwithatree-structuredgraph–graphswithoutanycycle.Infact,thegraphical... Read More >>
Identity technologies are problematic, and many see light at the end of the identity theft tunnel. The light is... Read More >>
The IPSec may be used in three different security - mains: Virtual private networks, Application-level security,... Read More >>
Online Business Security Systems applies the concept of synchronization to security of global heterogeneous and... Read More >>
Covers error-correcting codes, automorphism groups of codes, the key equation for codes from order domains, codes... Read More >>