Ben je op zoek naar information and communications security? Bekijk onze boeken selectie en zie direct bij welke webshop je information and communications security online kan kopen. Ga je voor een ebook of paperback van information and communications security. Zoek ook naar accesoires voor information and communications security. Zo ben je er helemaal klaar voor. Ontdek ook andere producten en koop vandaag nog je information and communications security met korting of in de aanbieding. Alles voor veel leesplezier!
This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019;
Vergelijkbare producten zoals Information and Communications Security
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016;
Vergelijkbare producten zoals Information and Communications Security
selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied;
Vergelijkbare producten zoals Information and Communications Security
Technologies for IT&C, Information Security Management, Cyber Defense, and Digital Forensics.;
Vergelijkbare producten zoals Innovative Security Solutions for Information Technology and Communications
This two-volume set LNCS 12918 - 12919 constitutes the refereed proceedings of the 23nd International Conference on Information and;
Vergelijkbare producten zoals Information and Communications Security
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and;
Vergelijkbare producten zoals Information and Communications Security
This book presents a state-of-the art review of current perspectives on Communications and Multimedia Security. It contains the;
Vergelijkbare producten zoals Communications and Multimedia Security
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017;
Vergelijkbare producten zoals Information and Communications Security
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information;
Vergelijkbare producten zoals Innovative Security Solutions for Information Technology and Communications
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Security for Information;
Vergelijkbare producten zoals Innovative Security Solutions for Information Technology and Communications
This book constitutes selected papers of the Second International Conference on Advanced Communication Systems and Information Security;
Vergelijkbare producten zoals Advanced Communication Systems and Information Security
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Security for Information Technology and;
Vergelijkbare producten zoals Innovative Security Solutions for Information Technology and Communications
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011;
Vergelijkbare producten zoals Information and Communication Security
communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced;
Vergelijkbare producten zoals Physical-Layer Security and Quantum Key Distribution
communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced;
Vergelijkbare producten zoals Physical-Layer Security and Quantum Key Distribution
networking, network and information security, communication QoS, reliability and modeling, pattern recognition and image signal processing, and;
Vergelijkbare producten zoals Communications and Networking
networking, network and information security, communication QoS, reliability and modeling, pattern recognition and image signal processing, and;
Vergelijkbare producten zoals Communications and Networking
Security, CRITIS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds;
Vergelijkbare producten zoals Critical Information Infrastructure Security
information security, IoT and cloud computing. The contribution ranges from scientists, engineers and technologists from academia as well as from;
Vergelijkbare producten zoals Trends in Wireless Communication and Information Security
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication;
Vergelijkbare producten zoals A Classical Introduction to Cryptography: Applications for Communications Security
overview of the current research in Multimedia and Communication Security. A broad variety of subjects are addressed including: network security;
Vergelijkbare producten zoals Communications and Multimedia Security II
Many organisations are transforming their businesses through the development of information and communications technologies. The security;
Vergelijkbare producten zoals Internet and Wireless Security
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures;
Vergelijkbare producten zoals Security Management of Next Generation Telecommunications Networks and Services
Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields;
Vergelijkbare producten zoals Communications and Multimedia Security
Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields;
Vergelijkbare producten zoals Communications and Multimedia Security
for today's security management professionals and students, explores the characteristics of today's globalized workplaces, security's key role;
Vergelijkbare producten zoals Security Operations Management
Gain a solid understanding of how information theoretic approaches can inform the design of more secure information systems and networks;
Vergelijkbare producten zoals Information Theoretic Security and Privacy of Information Systems
Einde inhoud
Geen pagina's meer om te laden'