Sold Out
Book Categories |
Network security and survivability : using wireless overlay networks for critical infrastructure protection M. Burmester Burmester, M. 3
Security when routers are taken over by the adversary Y. Desmedt Desmedt, Y. 10
Security in quantum cryptography and quantum networks J. Gruska Gruska, J. 19
The case for self-healing software A. D. Keromytis Keromytis, A. D. 47
Multi-agent modeling and the simulation of computer network security processes : "a game of network cats and mice" I. Kotenko Kotenko, I. 56
Formal treatment of secure protocols : an introduction D. Krizanc Krizanc, D. J. Lipton Lipton, J. 74
Behavioral and structural properties of malicious code C. Kruegel Kruegel, C. 92
Security from the practitioner's point of view M. Oit Oit, M. 110
Mobile and wireless communications security B. Preneel Preneel, B. 119
Humanitarian problems in information security V. Tairyan Tairyan, V. E. Tairyan Tairyan, E. D. Martirosyan Martirosyan, D. S. Babayan Babayan, S. A. Tadevosyan Tadevosyan, A. V. Prokhorenko Prokhorenko, V. S. Tairyan Tairyan, S. 134
Multimedia security : open problems and solutions S. Voloshynovskiy Voloshynovskiy, S. O. Koval Koval, O. F. Deguillaume Deguillaume, F. T. Pun Pun, T. 143
A selective introduction to border gateway patrol (BGP) security issues T. Wan Wan, T. P. C. van Oorschot van Oorschot, P. C. E. Kranakis Kranakis, E. 152
Steganography & steganalysis : an overview of research & challenges S. S. Agaian Agaian, S. S. 179
Guessing and cryptography E. Arikan Arikan, E. 211
The exact and approximate encryption of quantum information J. Bouda Bouda, J. 218
A new approach to stochastic quantum processes, theirmanipulation and control A. Gevorkyan Gevorkyan, A. 234
Reliability approach in Wiretapper guessing theory E. A. Haroutunian Haroutunian, E. A. 248
E-capacity of information hiding systems M. E. Haroutunian Haroutunian, M. E. 261
Quasicrystals in cryptography J. Patera Patera, J. M. Nesterenko Nesterenko, M. 274
Asymptotic investigation of mutual information and capacity of certain communication channels V. Prevlov Prevlov, V. 283
Information theory of covert timing channels A. B. Wagner Wagner, A. B. V. Anantharam Anantharam, V. 292
A survey of new results in coding with feedback and searching with lies C. Deppe Deppe, C. 299
Remarks on e-optimal rate function in DMS coding A. Harutyunyan Harutyunyan, A. 308
Reconstruction of data distorted by some errors E. Konstantinova Konstantinova, E. 315
On (w, r) cover-free codes V. Lebedev Lebedev, V. 324
Switching methods for error-correcting codes F. Soloveva Soloveva, F. 333
On reconstruction of functions on the hyperdube A. Vasileva Vasileva, A. 343
Index 351
Author index 355
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionAspects of Network and Information Security
X
This Item is in Your InventoryAspects of Network and Information Security
X
You must be logged in to review the productsX
X
X
Add Aspects of Network and Information Security, , Aspects of Network and Information Security to the inventory that you are selling on WonderClubX
X
Add Aspects of Network and Information Security, , Aspects of Network and Information Security to your collection on WonderClub |