Télécharger le livre :  The Austin Protocol Compiler
Ajouter à ma liste d'envies
There are two groups of researchers who are interested in designing network protocols and who cannot (yet) effectively communicate with one another c- cerning these protocols. The first is the group of protocol verifiers, and the second is the group of protocol...

Editeur : Springer
Parution : 2006-01-20
Collection : Advances in Information Security
PDF

107,99
Télécharger le livre :  Intrusion Detection and Correlation
Ajouter à ma liste d'envies
Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security...

Editeur : Springer
Parution : 2005-12-29
Collection : Advances in Information Security
PDF

107,99
Télécharger le livre :  Image and Video Encryption
Ajouter à ma liste d'envies
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different...

Editeur : Springer
Parution : 2005-12-28
Collection : Advances in Information Security
PDF

107,99
<< < 123