Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China

Buy
This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007.

The 38 revised full papers presented were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.

(HTML tags aren't allowed.)

Auditing After Sarbanes-Oxley
Auditing After Sarbanes-Oxley

This casebook is intended as a supplement to any primary auditing text, as it helps extend and focus classroom discussions on the impact of Sarbanes-Oxley. It grabs student interest by providing engaging, real- world examples of the auditing environment pre- and post-Sarbanes-Oxley.
The text presents a total of 35 “ripped from
...

The ECG in Prehospital Emergency Care
The ECG in Prehospital Emergency Care

Now that state of the art equipment can be carried in ambulances, prehospital emergency staff are able to perform an ECG soon after arrival on scene, enabling the EMS provider to gather important diagnostic information that can not only guide prehospital therapy but also direct hospital-based treatment. 

...

Mastering OpenCV 4 with Python: A practical guide covering topics from image processing, augmented reality to deep learning with OpenCV 4 and Python 3.7
Mastering OpenCV 4 with Python: A practical guide covering topics from image processing, augmented reality to deep learning with OpenCV 4 and Python 3.7

Create advanced applications with Python and OpenCV, exploring the potential of facial recognition, machine learning, deep learning, web computing and augmented reality.

Key Features

  • Develop your computer vision skills by mastering algorithms in Open Source Computer Vision 4 (OpenCV 4)and...

Alan Simpson's Windows XP Bible
Alan Simpson's Windows XP Bible
Comprehensive in its treatment of Microsoft's latest and greatest operating system for the masses, Alan Simpson's Windows XP Bible has an answer to most "How do I..." questions that are likely to arise in the minds of Windows XP users, particularly those who aren't too familiar with recent versions of Windows. If you're going to...
Visual Basic.NET and XML: Harness the Power of XML in VB.NET Applications
Visual Basic.NET and XML: Harness the Power of XML in VB.NET Applications

Microsoft envisions a future where the Web will host millions of distributed applications all communications via XML. Data packaged in XL will flow to and from databases, between applications, and directly to the browser.

With the release of Visual Basic .NET, XML support is tightly integrated into the language and provides numerous...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy