Comparison of smart grid with cognitive radio: solutions to spectrum scarcity
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Virtue, Privacy and Self-Determination: A Plotinian Approach to the Problem of Information Privacy
International Journal of Cyber Ethics in Education
Hi-index | 0.00 |
Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Written by an international team of experts, this one-stop reference maps out the latest user authentication methods, as well as authorization and access controls and their applications in today's database systems. The book addresses network security in depth, offering a fresh look at anti-intrusion approaches, intrusion detection systems, authentication and authorization infrastructures, identity certificates, smart cards, and tokens.