 |
|
 Multimedia Content Encryption: Techniques and Applications
How to Design a Secure Multimedia Encryption Scheme
The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or... |  |  Absolute Beginner's Guide to Personal FirewallsThe Absolute Beginner's Guide to Personal Firewalls is designed to provide simplified, yet thorough firewall information on the most prevalent personal firewall software applications available for the non expert firewall consumer. In addition, it offers information and links to Web sites that will help you test your security after your personal... |  |  The Thermodynamic Universe: Exploring the Limits of PhysicsParticle Physics and High Energy Physics have stagnated since the early 1970s. Now, the underlying principle of reductionism -- so sacred to twentieth-century physics -- is itself being questioned. This book examines these tumultuous developments that are leading to a paradigm shift and a new horizon for Physics.
Presenting the new paradigm... |
|
 Hacking Exposed LinuxGNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are... |  |  |  |  Trends in Functional Programming 6This book contains selected papers from the proceedings presented at the Sixth Symposium on Trends in Functional Programming (TFP05). Continuing the TFP series with its previous instances held in Stirling (1999), St. Andrews (2000), Stirling (2001), Edinburgh (2003) and Munich (2004) the symposium was held in Tallinn, Estland in co-location with... |
|
|
|
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 |