Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with...
A Mathematical Introduction to Logic, Second Edition, offers increased flexibility with topic coverage, allowing for choice in how to utilize the...
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature...
Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent...
Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide...
Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns...
Finally--a single volume guide to really effective security for both voice and data wireless networks! More and more data and voice communications are...
Master CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam...
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in...