|
|
|
|
| | Automata, Languages and Programming: 31st International Colloquium, ICALP 2004, Turku, Finland, July 12-16, 2004, ProceedingsThis book constitutes the refereed proceedings of the 31st International Colloquium on Automata, Languages and Programming, ICALP 2004, held in Turku, Finland, in July 2004.
The 97 revised full papers presented together with abstracts of 6 invited talks were carefully reviewed and selected from 379 submissions. The papers address all current... | | Designing Network Security (2nd Edition) (Networking Technology)Master the design of secure networks with the updated edition of this best-selling security guide
* Gain a comprehensive view of network security issues and concepts, then master specific implementations based on your network needs * Learn how to use new and legacy Cisco Systems equipment to secure your networks * Understand how... |
|
Mobile Application Security
Secure today's mobile devices and applications
Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest... | | CCNA Security Lab Manual
The only authorized Lab Portfolio for the new Cisco Networking Academy CCNA Security Course
-
Gives CCNA Security students a comprehensive, printed and bound lab resource containing all of the course's labs, for use whenever Internet access isn't available
-
Handy printed...
| | Multimedia Content Encryption: Techniques and Applications
How to Design a Secure Multimedia Encryption Scheme
The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or... |
|
|
Advances of DNA Computing in Cryptography
This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA... | | | | The Twofish Encryption Algorithm: A 128-Bit Block CipherThe first and only guide to one of today’s most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |