Login       My Wishlist
  My Cart
$0.00 / 0 items
Spring Brook Audio
The Best Audio Books on the Web
International Access
Global Shipping Options Available
  Our Catalog   Computers & Technology   Security & Encryption

Security & Encryption - 184 - Page 4 - Blowout Sale! Save up to 60%

Blowout Sale! Up to 60% off on Security & Encryption at Spring Brook Audio, Page 4. Top brands include Brand: Butterworth-Heinemann, Springer, Syngress, Beigi, Homayoon, Syngress Publishing, Course Technology, & Auerbach Publications. Hurry! Limited time offers. Offers valid only while supplies last.

Biometric Technologies and Verification Systems
By Brand: Butterworth-Heinemann
In Stock
You Save: 35%

ean: 9780750679671, isbn: 0750679670,

4.5 out of 5 stars with 140 reviews
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a

Advances in Audio Watermarking Based on Singular Value Decomposition (SpringerBriefs in Speech Technology)
By Springer
In Stock
You Save: 9%

mpn: 8 black & white illustrations, 18 colour, ean: 9783319147994, isbn: 3319147994,

4.1 out of 5 stars with 33 reviews
This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an

Information Hiding in Speech Signals for Secure Communication
By Syngress
In Stock
You Save: 18%

ean: 9780128013281, isbn: 0128013281,

4.4 out of 5 stars with 9 reviews
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art

Fundamentals of Speaker Recognition
By Beigi, Homayoon
In Stock
You Save: 60%

mpn: 9780387775913, ean: 9780387775913, isbn: 0387775919,

4.5 out of 5 stars with 40 reviews
An emerging technology, Speaker Recognition is becoming well-known for providing voice authentication over the telephone for helpdesks, call centres and other enterprise businesses for business process automation. ''Fundamentals of Speaker Recognition'' introduces Speaker Identification, Speaker Verification, Speaker (Audio Event) Classification, Speaker Detection, Speaker Tracking and more. The technical problems are rigorously defined, and a complete picture is made of the relevance of the

Audio Content Security: Attack Analysis on Audio Watermarking
By Syngress Publishing
In Stock
You Save: 24%

ean: 9780128113837, isbn: 0128113839,

4.2 out of 5 stars with 10 reviews
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An

Guide to Computer Forensics and Investigations (Book & CD)
By Course Technology
In Stock
You Save: 45%

ean: 9781435498839, isbn: 1435498836,

4.0 out of 5 stars with 23 reviews
Master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS. This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections, and content includes how to set up a forensics lab, how to acquire the proper

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
By Auerbach Publications
In Stock
You Save: 22%

ean: 9781439801963, isbn: 9781439801963,

4.6 out of 5 stars with 14 reviews
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with

Viewing Page 4 of 4

View more products in Computers & Technology.
Feel free to Browse Our Catalog.

Privacy Policy / Terms of Service / Accessibility Statement
© 2020 - springbrookaudio.com. All Rights Reserved.