๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Algorithms, architectures and information systems security

โœ Scribed by Aditya Bagchi, Bhargab B. Bhattacharya, Susmita Sur-kolay, Subhas C. Nandy


Publisher
World Scientific
Year
2009
Tongue
English
Leaves
384
Series
Statistical science and interdisciplinary research 3
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Embedded Multimedia Security Systems: Al
โœ Amit Pande, Joseph Zambreno (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag London ๐ŸŒ English

<p>Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features

Embedded Multimedia Security Systems: Al
โœ Amit Pande, Joseph Zambreno ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag ๐ŸŒ English

Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: r

Information Retrieval Architecture and A
โœ Gerald Kowalski (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› Springer US ๐ŸŒ English

<p><p>This text presents a theoretical and practical examination of the latest developments in Information Retrieval and their application to existing systems. By starting with a functional discussion of what is needed for an information system, the reader can grasp the scope of information retrieva

Information Retrieval Architecture and A
โœ Gerald Kowalski (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› Springer US ๐ŸŒ English

<p><p>This text presents a theoretical and practical examination of the latest developments in Information Retrieval and their application to existing systems. By starting with a functional discussion of what is needed for an information system, the reader can grasp the scope of information retrieva