authentication
1Food Authentication. Management, Analysis and Regulation , Georgios Danezis P.
The determination of food authenticity is a vital component of quality control. Its importance has been highlighted in recent years by high-profile cases in the global supply chain such as the… 15443.31 руб электронная книга2Security Features of Banknotes and other Documents Methods of Authentication Manual Денежные билеты бланки ценных бумаг и документов , Belousov A. (2012)
This book is sold subject to the condition that it shall not, by way of trade or otherwise, be lent, resold, hired out, or otherwise circulated without the publisher's prior consent in any form… 990 руб3Resource Optimization and Security for Cloud Services , Kaiqi Xiong
This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or… 9112.14 руб электронная книга4Cryptography Engineering. Design Principles and Practical Applications , Bruce Schneier
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes… 3577.17 руб электронная книга5Beginning Cryptography with Java , David Hook
Beginning Cryptography with Java While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the… 3121.25 руб электронная книга6Linux Security. Craig Hunt Linux Library , Ramón Hontañón J.
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a… 3901.72 руб электронная книга7TCP _ IP For Dummies , Candace Leiden
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay… 2340.77 руб электронная книга8Mobility Protocols and Handover Optimization. Design, Evaluation and Application , Schulzrinne Henning
This book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks. In this book, the authors show how an… 10068.11 руб электронная книга9Information Security. Principles and Practice , Mark Stamp
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex… 9912.02 руб электронная книга10The Scientist And The Forger , Ragai Jehane (2015)
The scientific techniques described encompass relevant examples of forgery detection and of authentication. The book deals, to name a few, with the Chagall, the Jackson Pollock and the Beltracchi… 756 руб