You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. The final chapters introduce modern e- business systems based on digital cash.
This book exclusively focuses on the science and fundamentals of polymer gels, as well as the numerous advantages that polymer gel-based materials offer. It presents a comprehensive collection of chapters on the recent advances and developments in the core science and fundamentals of both synthetic and natural polymer-based gels, and pays particular attention to applications in the various research fields of biomedicine and engineering. Key topics addressed include: polysaccharide-based gels and their fundamentals; stimuli-responsive polymer gels; polymer gels applied to enzyme and cell immobilization; chitosan-based gels for cancer therapy; natural polymeric and gelling agents; radiation dosimetry; polymeric gels as vehicles for enhanced drug delivery across the skin; transport in and through gel; and polymer gel nanocomposites and functional gels. The book’s extensive and highly topical coverage will appeal to researchers working in a broad range of fields in industry and academia alike.
This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006. The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections.
This volume provides a concise yet comprehensive overview of precancerous lesions and gynecologic tract cancers. Each section discusses the historic evolution of a precancerous lesion, its epidemiology, the nature of the published evidence that supports its characterization as a precancerous lesion, and gives a detailed description of morphologic, immunophenotypic and molecular properties, and patient outcomes. The volume also features 2 separate chapters on the clinical management of precancerous lesions of the gynecologic tract as a well as the cytopathology of cervical precancerous lesions. Lavishly illustrated and written by some of the foremost experts in the field, Precancerous Lesions of the Gynecologic Tract: Diagnostic and Molecular Genetic Pathology is a definitive account of precancerous lesions of the gynecologic tract and is a valuable resource for pathologists, oncologists, and gynecologists.
None
Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the bo
Metal Organic Frameworks and Their Derivatives for Energy Conversion and Storage comprehensively covers the updated design and synthesis of metal organic frameworks (MOFs) and their derived materials, together with their applications in electrochemical energy conversion and storage. It starts with a systematic description of the rational structure design and facile fabrication methods of MOF-based materials and various MOF derivatives. Then representative examples of MOFs and MOF-derived materials used for solar water splitting, electrocatalysis, batteries and supercapacitors are demonstrated. Finally, developing trends, such as integrating MOFs with other smart materials and emerging 3D pri...
The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. Comprehensive in scope, this book covers applied and practical elements, theory, and the reasons for the design of applications and security techniques.
Artificial Intelligence applications build on a rich and proven theoretical background to provide solutions to a wide range of real life problems. The ever expanding abundance of information and computing power enables researchers and users to tackle higly interesting issues for the first time, such as applications providing personalized access and interactivity to multimodal information based on preferences and semantic concepts or human-machine interface systems utilizing information on the affective state of the user. The purpose of the 3rd IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI) is to bring together researchers, engineers, and practitioners interested in the technical advances and business and industrial applications of intelligent systems. AIAI 2006 is focused on providing insights on how AI can be implemented in real world applications.