Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Available
0
StarStarStarStarStar
0Reviews
Unknown authorUnknown author
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challeng...
Read more
E-book
pdf
Price
44.99 £
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challeng...
Read more

Options

  • Formats: pdf
  • ISBN: 9783540723547
  • Publication Date: 3 Jul 2007
  • Publisher: Springer Berlin Heidelberg
  • Product language: English
  • Drm Setting: DRM