Sherzod Hamzayev | Tashkent University of Information Technologies (original) (raw)

Uploads

Papers by Sherzod Hamzayev

Research paper thumbnail of Stefan Katzenbeisser Information Hiding Techniques for Steganography and Digital Watermarking -Book

For quite a long time, computer security was a rather narrow field of study that was populated ma... more For quite a long time, computer security was a rather narrow field of study that was populated mainly by theoretical computer scientists, electrical engineers, and applied mathematicians. With the proliferation of open systems in general, and the Internet and the World Wide Web (WWW) in particular, this situation has changed fundamentally. Today, computer and network practitioners are equally interested in computer security, since they require technologies and solutions that can be used to secure applications related to electronic commerce (e-commerce). Against this background, the field of computer security has become very broad and includes many topics of interest. The aim of this series is to publish state-of-the-art, high-standard technical books on topics related to computer security. Further information about the series can be found on the WWW by following the URL:

Research paper thumbnail of Stefan Katzenbeisser Information Hiding Techniques for Steganography and Digital Watermarking -Book

For quite a long time, computer security was a rather narrow field of study that was populated ma... more For quite a long time, computer security was a rather narrow field of study that was populated mainly by theoretical computer scientists, electrical engineers, and applied mathematicians. With the proliferation of open systems in general, and the Internet and the World Wide Web (WWW) in particular, this situation has changed fundamentally. Today, computer and network practitioners are equally interested in computer security, since they require technologies and solutions that can be used to secure applications related to electronic commerce (e-commerce). Against this background, the field of computer security has become very broad and includes many topics of interest. The aim of this series is to publish state-of-the-art, high-standard technical books on topics related to computer security. Further information about the series can be found on the WWW by following the URL:

Log In