|
|
Network Security Policies and Procedures (Advances in Information Security)Technology is progressing at an astounding pace, and many organizations are working so hard to implement the technologies they need to survive need to understand how their network security policies and procedures regimen fits into the picture.
As with all technology nowadays, the next significant change is already beginning to happen. As... | | Computable ModelsComputational models can be found everywhere in present day science and engineering. In providing a logical framework and foundation for the specification and design of specification languages, Raymond Turner uses this framework to introduce and study computable models. In doing so he presents the first systematic attempt to provide computational... | | Network Infrastructure SecurityResearch on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... |
|
|
|
Quantum Magnetism (Lecture Notes in Physics)Putting the quantum into magnetism might, at first sight, seem like stating the obvious; the exchange interactions leading to collective magnetic behavior are, after all, a pure quantum effect. Yet, for many phenomena in magnetism this underlying quantum nature may be safely ignored at least on the qualitative level. The investigation of magnetic... | | | | Random Curves: Journeys of a MathematicianThese autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital signature, cover many topics besides his own personal career in mathematics and cryptography - travels to the Soviet Union, Latin America, Vietnam and elsewhere, political activism, and academic controversies relating to math... |
|
Result Page: 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 |