Information And Security: Where Truth Lies

Hard and Soft Computing for Artificial Intelligence, Multimedia and Security  eBooks & eLearning

Posted by nebulae at Oct. 21, 2016
Hard and Soft Computing for Artificial Intelligence, Multimedia and Security

Shin-ya Kobayashi, "Hard and Soft Computing for Artificial Intelligence, Multimedia and Security"
English | ISBN: 3319484281 | 2016 | 368 pages | PDF | 26 MB

Fundamentals Of Information Systems Security  eBooks & eLearning

Posted by andr1078 at April 23, 2017
Fundamentals Of Information Systems Security

David Kim, Michael G. Solomon "Fundamentals Of Information Systems Security"
Publisher: Jones & Bartlett Learning | English | 2016 | ISBN: 128411645X | 548 pages | PDF | 10.7 MB

Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security.

Cryptography and Security Services [Repost]  eBooks & eLearning

Posted by tanas.olesya at April 23, 2017
Cryptography and Security Services [Repost]

Cryptography and Security Services: Mechanisms and Applications by Manuel Mogollon
CyberTech Publishing; 1 edition | January 7, 2008 | English | ISBN: 159904837X | 490 pages | PDF | 4 MB

Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems.

Modernist Informatics: Literature, Information, and the State  eBooks & eLearning

Posted by ksveta6 at April 23, 2017
Modernist Informatics: Literature, Information, and the State

Modernist Informatics: Literature, Information, and the State (Modernist Literature and Culture) by James Purdon
2015 | ISBN: 0190211695 | English | 240 pages | PDF | 4 MB

Multimedia Communications, Services and Security  eBooks & eLearning

Posted by ChrisRedfield at April 18, 2017
Multimedia Communications, Services and Security

Andrzej Dziech, Mikolaj Leszczuk, Remigiusz Baran - Multimedia Communications, Services and Security
Published: 2015-12-10 | ISBN: 3319264036 | PDF | 211 pages | 39.2 MB
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings

Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings by Anja Lehmann
English | 2015 | ISBN: 331917469X | 297 Pages | PDF | 5.15 MB
Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in... (repost)

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure by Zofia Lukszo, Geert Deconinck, Margot P.C. Weijnen
English | 2010 | ISBN: 9048135931 | 431 pages | PDF | 4,4 MB

Rethinking Security in the Age of Migration: Trust and Emancipation in Europe  eBooks & eLearning

Posted by Sangviniy at March 28, 2017
Rethinking Security in the Age of Migration: Trust and Emancipation in Europe

Rethinking Security in the Age of Migration: Trust and Emancipation in Europe (Routledge Research on the Global Politics of Migration) by Ali Bilgic
English | Mar. 12, 2013 | ISBN: 0415694191 | 224 Pages | PDF | 5.46 MB

Migration and especially irregular migration are politically sensitive and highly debated issues in the developed world, particularly in Europe. This book analyses irregular protection-seeking migration in Europe, with close attention to sub-Saharan migration into the EU, from the perspective of emancipatory security theory.
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)

Python for Graph and Network Analysis (Advanced Information and Knowledge Processing) by Mohammed Zuhair Al-Taie
English | 18 Apr. 2017 | ISBN: 3319530038 | 203 Pages | PDF | 12.96 MB

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego, group, and community.
Advances in Information and Computer Security: 4th International Workshop on Security [repost]

Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings (Lecture Notes in Computer Science) by Tsuyoshi Takagi
English | Oct. 5, 2009 | ISBN: 3642048455 | 237 Pages | PDF | 3 MB