|
|
|
|
|
|
|
Clustering (IEEE Press Series on Computational Intelligence)Clustering has become an increasingly important topic in recent years, caused by the glut of data from a wide variety of disciplines. However, due to the lack of good communication among these communities, similar theories or algorithms are redeveloped many times, causing unnecessary waste of time and resources. Furthermore, different terminologies... | | Java Security (2nd Edition)One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is... | | Cryptographic Security Architecture: Design and VerificationThis book describes various aspects of cryptographic security architecture design, with a particular emphasis on the use of rigorous security models and practices in the design. The first portion of the book presents the overall architectural basis for the design, providing a general overview of features such as the object model and... |
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 |