• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Security Technology: International Conference, Sectech 2009, Held as Part of the Future Generation Information Technology Conference, Fgit » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Security Technology: International Conference, Sectech 2009, Held as Part of the Future Generation Information Technology Conference, Fgit

ISBN-13: 9783642108464 / Angielski / Miękka / 2009 / 308 str.

Dominik Slezak
Security Technology: International Conference, Sectech 2009, Held as Part of the Future Generation Information Technology Conference, Fgit Slezak, Dominik 9783642108464 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Security Technology: International Conference, Sectech 2009, Held as Part of the Future Generation Information Technology Conference, Fgit

ISBN-13: 9783642108464 / Angielski / Miękka / 2009 / 308 str.

Dominik Slezak
cena 201,72
(netto: 192,11 VAT:  5%)

Najniższa cena z 30 dni: 192,74
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D- aster Recovery and Business Continuity (DRBC; published independently), Future G- eration Communication and Networking (FGCN) that was combined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), M- timedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and- and e-Service, Science and Technology (UNESST).

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Information Technology
Computers > Security - Cryptography & Encryption
Computers > Data Science - General
Wydawca:
Springer
Seria wydawnicza:
Communications in Computer and Information Science
Język:
Angielski
ISBN-13:
9783642108464
Rok wydania:
2009
Wydanie:
2010
Numer serii:
000354756
Ilość stron:
308
Waga:
0.50 kg
Wymiary:
23.11 x 15.49 x 2.03
Oprawa:
Miękka
Wolumenów:
01

Applications of Reversible Data Hiding Techniques with the Quick Response Codes.- A New Approach in T-FA Authentication with OTP Using Mobile Phone.- Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.- A Study on Secure Contents Using in Urban Computing.- Shadow Generation Protocol in Linguistic Threshold Schemes.- Analysis of Handwritten Signature Image.- The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device.- Hardware Based Data Inspection for USB Data Leakage Prevention.- Grayscale Image Classification Using Supervised Chromosome Clustering.- Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models.- Impact of Malicious Node on Broadcast Schemes.- Hierarchical Identity-Based Identification Schemes.- The Trend of the Security Research for the Insider Cyber Threat.- MIMO Wiretap Channel: A Scalar Approach.- Security Testing for Operating System and Its System Calls.- Efficient Group Signature with Forward Secure Revocation.- Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.- Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code.- Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code.- Feature Level Fusion of Biometrics Cues: Human Identification with Doddington’s Caricature.- A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network.- DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.- A Development of Finite State Machine Create Tool for Cryptography Module Validation.- A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments.- Fusion of Multiple Matchers Using SVM for Offline Signature Identification.- A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card.- Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.- Accelerometer Based Digital Video Stabilization for Security Surveillance Systems.- Escrowed Deniable Identification Schemes.- Insights into Malware Detection and Prevention on Mobile Phones.- Automation of Post-exploitation.- Speaker Dependent Frequency Cepstrum Coefficients.- Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.- A Simple Encryption Scheme for Binary Elliptic Curves.- Analysis of Text Complexity in a Crypto System – A Case Study on Telugu.- Symmetric-Key Encryption for Wireless Internet SCADA.- An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia