Ben je op zoek naar information and communication security? Bekijk onze boeken selectie en zie direct bij welke webshop je information and communication security online kan kopen. Ga je voor een ebook of paperback van information and communication security. Zoek ook naar accesoires voor information and communication security. Zo ben je er helemaal klaar voor. Ontdek ook andere producten en koop vandaag nog je information and communication security met korting of in de aanbieding. Alles voor veel leesplezier!
MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area;
Vergelijkbare producten zoals Security and Privacy in Mobile Information and Communication Systems
information security, IoT and cloud computing. The contribution ranges from scientists, engineers and technologists from academia as well as from;
Vergelijkbare producten zoals Trends in Wireless Communication and Information Security
cybersecurity structure and provides specific security challenges and possible solutions in Vehicular Communication such as vehicle to vehicle;
Vergelijkbare producten zoals Information Security of Intelligent Vehicles Communication
cybersecurity structure and provides specific security challenges and possible solutions in Vehicular Communication such as vehicle to vehicle;
Vergelijkbare producten zoals Information Security of Intelligent Vehicles Communication
This book constitutes selected papers of the Second International Conference on Advanced Communication Systems and Information Security;
Vergelijkbare producten zoals Advanced Communication Systems and Information Security
MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area;
Vergelijkbare producten zoals Security and Privacy in Mobile Information and Communication Systems
This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary;
Vergelijkbare producten zoals Cryptology Transmitted Message Protection
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011;
Vergelijkbare producten zoals Information and Communication Security
Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, in Nanjing, China, in December 2020. The 48;
Vergelijkbare producten zoals Security, Privacy, and Anonymity in Computation, Communication, and Storage
With most services and products now being offered through digital communications, new challenges have emerged for information security;
Vergelijkbare producten zoals A Multidisciplinary Introduction to Information Security
The author covers the fundamentals of both information and communication security including current developments in some of the most;
Vergelijkbare producten zoals Information Security for Automatic Speaker Identification
transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with;
Vergelijkbare producten zoals Physical and Data-Link Security Techniques for Future Communication Systems
transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with;
Vergelijkbare producten zoals Physical and Data-Link Security Techniques for Future Communication Systems
growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant;
Vergelijkbare producten zoals Cyber Security
growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant;
Vergelijkbare producten zoals Cyber Security
transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and;
Vergelijkbare producten zoals Proceedings of the 2nd Workshop on Communication Security
-security, intelligent information applications, database and system security, image and video signal processing, pattern recognition, information;
Vergelijkbare producten zoals Advanced Research on Electronic Commerce, Web Application, and Communication
-security, intelligent information applications, database and system security, image and video signal processing, pattern recognition, information;
Vergelijkbare producten zoals Advanced Research on Electronic Commerce, Web Application, and Communication
, case studies related to all the areas of data mining, machine learning, IoT and information security.;
Vergelijkbare producten zoals Emerging Technologies in Data Mining and Information Security
; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International;
Vergelijkbare producten zoals E-Business and Telecommunications
) and information security.;
Vergelijkbare producten zoals Emerging Technologies in Data Mining and Information Security
), and information security.;
Vergelijkbare producten zoals Emerging Technologies in Data Mining and Information Security
) and information security.;
Vergelijkbare producten zoals Emerging Technologies in Data Mining and Information Security
This book constitutes revised selected papers from the Third International Conference on Information and Communication Technology and;
Vergelijkbare producten zoals Information and Communication Technology and Applications
This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication;
Vergelijkbare producten zoals Information and Communication Technology
Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your;
Vergelijkbare producten zoals The Information Systems Security Officer's Guide
The conference on network security and communication engineering is meant to serve as a forum for exchanging new developments and research;
Vergelijkbare producten zoals Network Security and Communication Engineering
Einde inhoud
Geen pagina's meer om te laden'