41
Published 2019
Springer International Publishing
Table of Contents: ... for Calculating the Amount of Motion Based on 3D Pose Estimation -- Design of Security Portrait Big Data...

42
Published 2021
Springer International Publishing
Table of Contents: ... Hyperactivity Disorder with Laplacian Regularization --...

43
by Vehent, Julien
Published 2018
Manning Publications
Table of Contents: ... -- 11.7.2 Revisiting risks regularly -- Summary -- Chapter 12: Testing security -- 12.1 Maintaining security...

44
by Lockhart, Andrew
Published 2006
O'Reilly
Subjects: ...Computer security...

45
by van Oorschot, Paul C.
Published 2020
Springer International Publishing
Table of Contents: ..., Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security...

46
by Arnett, George W.
Published 2011
John Wiley & Sons
Table of Contents: ... of the World Markets -- Transfer of Securities and Perfection of Collateral -- Margin -- Short Selling...

47
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Distributed Systems Security: Foundations -- Edge Eavesdropping Games -- Universally Composable...

48
by Babbin, Jacob
Published 2006
Syngress
Subjects: ...COMPUTERS / Internet / Security / bisacsh...

51
Published 2014
Springer International Publishing
Table of Contents: ...System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You...

52
Published 2018
Springer International Publishing
Subjects: ...Data and Information Security...

53
Published 2017
Springer International Publishing
Table of Contents: ...Post-quantum cryptography -- System security -- Public key cryptosystems -- Cryptanalysis...

54
Published 2018
Springer International Publishing
Table of Contents: ...Security and privacy in machine learning -- Differential privacy -- Cyber security research...

55
Published 2018
Springer International Publishing
Table of Contents: ...Cryptanalysis -- Implementation Security -- Public-Key Primitives -- Security in Practice -- Secret...

56
Published 2016
Springer International Publishing
Table of Contents: ...System security -- Searchable encryption -- Cryptanalysis -- Permutation and symmetric encryption...

57
Published 2015
Springer International Publishing
Table of Contents: ...System Security -- Stream Cipher -- Analysis -- Key Exchange Protocol -- Elliptic Curve...

58
by Seacord, Robert C.
Published 2015
Addison-Wesley Professional
... Secure Coding Standard for Java, demonstrating common Java programming errors and their consequences...

59
by Wenz, Christian
Published 2022
Manning Publications
Subjects: ...Web sites / Security measures...

60
Published 2017
Springer International Publishing
Subjects: ...Data and Information Security...