|
|
|
|
Black Hat Physical Device Security: Exploiting Hardware and SoftwareAttacking & Defending Physical Devices for Software and Hardware EngineersThe security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy,... | | | | |
|
|
| | | | Biometric System and Data Analysis: Design, Evaluation, and Data MiningBiometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems. The focus of biometric research over the past four decades has... |
|
|
|
Result Page: 6 5 4 3 2 1 |