There`s a belief that cyberspace cannot be regulated - that is, its very essence is immune from the government`s control. This book presents an..
Нет в наличии
Рассмотрено развитие методического обеспечения защиты информации на объектах информатизации; представлен систематизированный обзор методов оценки..
Нет в наличии
Что такое компьютерные вирусы? Кто такие "дятлы"? Как правильно выбрать антивирусную защиту? Этот толковый словарь отвечает на эти и многие другие..
Нет в наличии
The modern time is the excellent age of the telecommunication and also challenging for the service provider to deliver demand of services to the end..
Нет в наличии
Today, the great use of secure images that are either transferred over a network or are stored on disk has raised a concern over information security...
Нет в наличии
Traditionally, software security is only considered in the later stages of software development with the incorporation of security concerns as an..
Нет в наличии
The book describes a system that encompasses a secure integration of new and existing identification systems aimed at providing real-time identity..
Нет в наличии
In this book, we address a key topic in the field of computer networking security which is detection of black hole nodes in MANET. This problem is a..
Нет в наличии
Revision with unchanged content. Peer-to-Peer (P2P) video conference systems receive more attention recently due to their distinctive advantages over..
Нет в наличии
VoIP is now considered one of the most commonly deployed technologies all over the world. VoIP applications. During this project: a secure peer to peer..
Нет в наличии