104 livres(s)
Télécharger le livre :  Diffusion in Social Networks
Ajouter à ma liste d'envies

Diffusion in Social Networks


Collectif


This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping...

Parution : 2015-09-16
Format(s) : PDF, ePub
Éditeur : Springer
J'achète
49,99
Télécharger le livre :  Secure Multiparty Computation and Secret Sharing
Ajouter à ma liste d'envies

Secure Multiparty Computation and Secret Sharing


Ronald Cramer , Ivan Bjerre Damgård , Jesper Buus Nielsen


In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive...

Parution : 2015-07-15
Format(s) : PDF, ePub
J'achète
80,53
Télécharger le livre :  Enterprise Cybersecurity
Ajouter à ma liste d'envies

Enterprise Cybersecurity


Abdul Aslam , Scott Donaldson , Stanley Siegel , Chris K. Williams


Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an...

Parution : 2015-05-23
Format(s) : PDF, ePub
Éditeur : Apress
J'achète
93,45
Télécharger le livre :  Foundations of Coding
Ajouter à ma liste d'envies

Foundations of Coding


Jean-Guillaume Dumas , Jean-Louis Roch , Éric Tannier , Sébastien Varrette


Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding...

Parution : 2015-01-22
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
107,95
Télécharger le livre :  The Manager's Guide to Web Application Security
Ajouter à ma liste d'envies

The Manager's Guide to Web Application Security


Ron Lepofsky


The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security...

Parution : 2014-12-26
Format(s) : ePub
Éditeur : Apress
J'achète
93,45
Télécharger le livre :  10 Don'ts on Your Digital Devices
Ajouter à ma liste d'envies

10 Don'ts on Your Digital Devices


Daniel Bachrach , Eric Rzeszut


In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on...

Parution : 2014-10-28
Format(s) : ePub
Éditeur : Apress
J'achète
32,70
Télécharger le livre :  Data Protection and Security for Personal Computers
Ajouter à ma liste d'envies

Data Protection and Security for Personal Computers


R. Schifreen


Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively. Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security...

Parution : 2014-06-28
Format(s) : PDF sans DRM
Éditeur : Elsevier Science
J'achète
160,00
Télécharger le livre :  Healthcare Information Privacy and Security
Ajouter à ma liste d'envies

Healthcare Information Privacy and Security


Bernard Peter Robichau


Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical...

Parution : 2014-06-23
Format(s) : ePub
Éditeur : Apress
J'achète
74,76
Télécharger le livre :  Computers and the General Practitioner
Ajouter à ma liste d'envies

Computers and the General Practitioner


Alastair Malcolm , John Poyser


Computers and the General Practitioner focuses on the applications of computers in various aspects of health service, including ECG analysis, primary care, and diagnosis. The selection first tackles general practice and technological promise and experience of...

Parution : 2014-05-09
Format(s) : PDF sans DRM
Éditeur : Pergamon
J'achète
24,95
Télécharger le livre :  Building the Infrastructure for Cloud Security
Ajouter à ma liste d'envies

Building the Infrastructure for Cloud Security


Enrique Castro-Leon , Raghuram Yeluri


For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud...

Parution : 2014-03-29
Format(s) : PDF, ePub
Éditeur : Apress
J'ajoute au panier
Gratuit
Télécharger le livre :  Security for Cloud Storage Systems
Ajouter à ma liste d'envies

Security for Cloud Storage Systems


Xiaohua Jia , Kan Yang


Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data...

Parution : 2013-07-01
Format(s) : ePub
Éditeur : Springer
J'achète
39,99
Télécharger le livre :  Simple Steps to Data Encryption
Ajouter à ma liste d'envies

Simple Steps to Data Encryption


Peter Loshin


Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be...

Parution : 2013-04-30
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
23,95
Télécharger le livre :  Data Hiding
Ajouter à ma liste d'envies

Data Hiding


Chet Hosmer , Michael T. Raggo


As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
38,95
Télécharger le livre :  Computational Number Theory and Modern Cryptography
Ajouter à ma liste d'envies

Computational Number Theory and Modern Cryptography


Song Y. Yan


The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song...

Parution : 2012-11-28
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
92,95
Télécharger le livre :  Digital Forensics for Legal Professionals
Ajouter à ma liste d'envies

Digital Forensics for Legal Professionals


Larry Daniel , Lars Daniel


Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors' years of experience in working with attorneys as digital forensics experts, common questions arise again and...

Parution : 2011-10-14
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
45,95
Télécharger le livre :  Windows Registry Forensics
Ajouter à ma liste d'envies

Windows Registry Forensics


Harlan Carvey


Windows Registry Forensics provides the background of theWindows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are...

Parution : 2011-01-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
52,95
Télécharger le livre :  Cryptography for Developers
Ajouter à ma liste d'envies

Cryptography for Developers


Tom St Denis


The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader.The second chapter discusses how to implement large...

Parution : 2006-12-01
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,95
Télécharger le livre :  Data Hiding Fundamentals and Applications
Ajouter à ma liste d'envies

Data Hiding Fundamentals and Applications


Ali N. Akansu , Mahalingam Ramkumar , Husrev T. Sencar


Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at...

Parution : 2004-09-09
Format(s) : epub sans DRM
Éditeur : Academic Press
J'achète
73,95
Télécharger le livre :  Java Cryptography Extensions
Ajouter à ma liste d'envies

Java Cryptography Extensions


Jason R. Weiss


For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about...

Parution : 2004-05-18
Format(s) : PDF sans DRM
Éditeur : Morgan Kaufmann
J'achète
24,95
Télécharger le livre :  Advances in Computers
Ajouter à ma liste d'envies

Advances in Computers


Marvin Zelkowitz


Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include...

Parution : 2004-04-30
Format(s) : PDF sans DRM
Éditeur : Academic Press
J'achète
149,00
<< < 3456 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés