 |
|
|
 Formal Correctness of Security Protocols (Information Security and Cryptography)Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.
The author investigates proofs of correctness of realistic security protocols in... |  |  Business Plans Kit For Dummies (Business & Personal Finance)With checklists, forms, and unbeatable resources to help you succeed
The painless way to create a winning business plan!
If you're an entrepreneur with big ideas but no plan, this friendly guide is for you. Updated and revised to better meet your business needs, this business plan companion covers it all — from... |  |  Technologies for Business Information SystemsThe material collected in Technologies for Business Systems covers a broad range of applications of computer science methods and algorithms in business practice. It presents a research cutting edge in development, implementation, and improvement of computer systems. The computer science and information systems topics covered in the book include... |
|
|
 |  |  Distributed and Parallel Systems: From Cluster to Grid ComputingThe sixthAustrian-HungarianWorkshop onDistributed and Parallel Systems is organized jointly byUniversity of Innsbruck and theMTASZTAKIComputer and Automation Research Institute. The series of workshops started as a small regional meeting early in the nineties, and since then it evolved a lot and became an acknowledged international scientific... |  |  |
|
| Result Page: 513 512 511 510 509 508 507 506 505 504 503 502 501 500 499 498 497 496 495 |