Описание: This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009.
Описание: This class-tested textbook will provide in-depth coverage of the fundamentals of machine learning, with an exploration of applications in information security. The book will cover malware detection, cryptography, and intrusion detection. The book will be relevant for students in machine learning and computer security courses.
Автор: Said El Hajji; Abderrahmane Nitaj; El Mamoun Souid Название: Codes, Cryptology and Information Security ISBN: 331955588X ISBN-13(EAN): 9783319555881 Издательство: Springer Рейтинг: Цена: 9083.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.
Автор: Bahram Javidi Название: Optical and Digital Techniques for Information Security ISBN: 1441919201 ISBN-13(EAN): 9781441919205 Издательство: Springer Рейтинг: Цена: 21661.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system--even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.
This book presents breakthroughs in the design of Wireless Energy Harvesting (WEH) networks. It bridges the gap between WEH through radio waves communications and power transfer, which have largely been designed separately. The authors present an overview of the RF-EHNs including system architecture and RF energy harvesting techniques and existing applications. They also cover the idea of WEH in novel discoveries of information, the theoretical bounds in WEH, wireless sensor networks, usage of modern channel coding together with WEH, energy efficient resource allocation mechanisms, distributed self-organized energy efficient designs, delay-energy trade-off, specific protocols for energy efficient communication designs, D2D communication and energy efficiency, cooperative wireless networks, and cognitive networks.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru