This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007.
The 38 revised full papers presented were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.
Auditing After Sarbanes-Oxley
This casebook is intended as a supplement to any primary auditing text, as it helps extend and focus classroom discussions on the impact of Sarbanes-Oxley. It grabs student interest by providing engaging, real- world examples of the auditing environment pre- and post-Sarbanes-Oxley.
The text presents a total of 35 “ripped from...
The ECG in Prehospital Emergency Care
Now that state of the art equipment can be carried in ambulances, prehospital emergency staff are able to perform an ECG soon after arrival on scene, enabling the EMS provider to gather important diagnostic information that can not only guide prehospital therapy but also direct hospital-based treatment.
Alan Simpson's Windows XP Bible Comprehensive in its treatment of Microsoft's latest and greatest operating system for the masses, Alan Simpson's Windows XP Bible has an answer to most "How do I..." questions that are likely to arise in the minds of Windows XP users, particularly those who aren't too familiar with recent versions of Windows. If you're going to... Visual Basic.NET and XML: Harness the Power of XML in VB.NET Applications
Microsoft envisions a future where the Web will host millions of distributed applications all communications via XML. Data packaged in XL will flow to and from databases, between applications, and directly to the browser.
With the release of Visual Basic .NET, XML support is tightly integrated into the language and provides numerous...
Hacking Exposed Wireless
Secure Your Wireless Networks the Hacking Exposed Way
Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...