There`s a belief that cyberspace cannot be regulated - that is, its very essence is immune from the government`s control. This book presents an..
Нет в наличии
Рассмотрено развитие методического обеспечения защиты информации на объектах информатизации; представлен систематизированный обзор методов оценки..
Нет в наличии
Что такое компьютерные вирусы? Кто такие "дятлы"? Как правильно выбрать антивирусную защиту? Этот толковый словарь отвечает на эти и многие другие..
Нет в наличии
The modern time is the excellent age of the telecommunication and also challenging for the service provider to deliver demand of services to the end..
Нет в наличии
Today, the great use of secure images that are either transferred over a network or are stored on disk has raised a concern over information security...
Нет в наличии
Cryptography, the science of encryption, plays a central role in mobile phone communications, pay-tv, e-commerce, sending private emails, transmitting..
Нет в наличии
In the democratic country like India, though there is an abundant development of technology, it is still lacking behind in the election process. The..
Нет в наличии
Traditionally, software security is only considered in the later stages of software development with the incorporation of security concerns as an..
Нет в наличии
The book describes a system that encompasses a secure integration of new and existing identification systems aimed at providing real-time identity..
Нет в наличии
In this book, we address a key topic in the field of computer networking security which is detection of black hole nodes in MANET. This problem is a..
Нет в наличии