Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
PKI Security Solutions for the Enterprise: Solving HIPAA, E-Paper Act, and Other Compliance Issues
The tools and techniques for leveraging PKI technologies to provide secure Internet transactions

Do your customers have the confidence to do business over the Internet? By implementing Public Key Infrastructure (PKI) technologies, you’ll be able to quickly gain their trust through secure transactions. This book provides you with a clear...

Understanding Forensic Digital Imaging
Understanding Forensic Digital Imaging
The science of digital imaging can be divided into two separate branches: the techniques that explain how to use and create digital images, and the technical knowledge that is necessary to design cameras, computers, and software. The expert witness should be a skilled practitioner in the techniques and have enough understanding of the technical...
Handbook of Biometrics
Handbook of Biometrics
Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of...
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings
Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings

It is a pleasure and an honour both to organize ICB 2009, the 3rd IAPR/IEEE International Conference on Biometrics. This will be held 2–5 June in Alghero, Italy, hosted by the Computer Vision Laboratory, University of Sassari. The conference series is the premier forum for presenting research in biometrics and its allied technologies:...

Unconstrained Face Recognition (International Series on Biometrics)
Unconstrained Face Recognition (International Series on Biometrics)
Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a...
Biometrics: Identity Verification in a Networked World
Biometrics: Identity Verification in a Networked World

An in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment

No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce...

Local Binary Patterns: New Variants and Applications (Studies in Computational Intelligence)
Local Binary Patterns: New Variants and Applications (Studies in Computational Intelligence)

This book introduces Local Binary Patterns (LBP), arguably one of the most powerful texture descriptors, and LBP variants. This volume provides the latest reviews of the literature and a presentation of some of the best LBP variants by researchers at the forefront of textual analysis research and research on LBP descriptors and variants. The...

CISSP : Certified Information Systems Security Professional Study Guide, Third Edition
CISSP : Certified Information Systems Security Professional Study Guide, Third Edition
CISSP Certified Information Systems Security Professional Study Guide

Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological...

Fabricated: The New World of 3D Printing
Fabricated: The New World of 3D Printing

Fabricated tells the story of 3D printers, humble manufacturing machines that are bursting out of the factory and into homes, businesses, schools, kitchens, hospitals, even the fashion catwalk. The magic happens when you plug a 3D printer into today's mind-boggling digital technologies. Add to that the Internet, tiny, low cost...

Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007
Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007
This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.

The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical...

Result Page: 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy