Books in category Computers – Security

  • Call Center Continuity Planning

    Call Center Continuity Planning
    Jim Rowan, Sharon Rowan

    Call Center Continuity Planning shows you how to plan for – and avoid – service interruptions through disasters large and small. This book will show you how to deal with everything from power outages to major hurricanes.

  • Accesso non autorizzato

    Accesso non autorizzato
    Dmitry Skyarov

  • Financial Cryptography and Data Security

    Financial Cryptography and Data Security
    Andrew S. Patrick, Moti Yung

    This book constitutes the thoroughly refereed post-proceedings of the 9th International Conference on Financial Cryptography and Data Security, FC 2005, held in Roseau, The Commonwealth Of Dominica, in February/March 2005.

  • Coding and Cryptology

    Coding and Cryptology
    Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang, Chaoping Xing

    Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011.

  • Ambient Intelligence

    Ambient Intelligence
    Emile H.L. Aarts, James L. Crowley, Heinz Gerhäuser, Alexander Pflaum, Janina Schmidt, Reiner Wichert

    This volume contains the proceedings of the Second European Ambient Intelligence (AmI) Conference. The conference took place in Erlangen and Nürnberg, November 19–22, 2008.

  • Complex Valued Neural Networks Utilizing High Dimensional Parameters

    Complex-Valued Neural Networks: Utilizing High-Dimensional Parameters
    Nitta, Tohru

    "This book covers the current state-of-the-art theories and applications of neural networks with high-dimensional parameters"–Provided by publisher.

  • Advances in Information Security and Assurance

    Advances in Information Security and Assurance
    Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman

    This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009.

  • Mastering Microsoft Forefront UAG 2010 Customization

    Mastering Microsoft Forefront UAG 2010 Customization
    Erez Ben-Ari, Rainier Amara

    You should have a strofng understanding of the regular functionality of UAG, as well as a solid background in web development (ASP, HTML, CSS and JavaScript) for this book to take you to the next level.

  • How to Cheat at Configuring ISA Server 2004

    How to Cheat at Configuring ISA Server 2004
    Debra Littlejohn Shinder, Thomas W Shinder

    While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day.

  • Applied Cryptography and Network Security

    Applied Cryptography and Network Security
    John Ioannidis, Angelos Keromytis, Moti Yung

    This book constitutes the refereed proceedings of the Third International Conference on Applied Cryptography and Network Security, ACNS 2005, held in New York, NY, USA in June 2005.

1 2 3 4 5 Next >