Sherzod Hamzayev - Profile on Academia.edu (original) (raw)

Stephen Junior related author profile picture

Mahesh Maurya related author profile picture

Sepol Omar related author profile picture

IOSR Journals related author profile picture

IRJET  Journal related author profile picture

IJESRT JOURNAL related author profile picture

Mazdak Zamani related author profile picture

Hussain Nyeem related author profile picture

WARSE The World Academy of Research in Science and Engineering related author profile picture

Luis Freire related author profile picture

Uploads

Papers by Sherzod Hamzayev

Research paper thumbnail of Stefan Katzenbeisser Information Hiding Techniques for Steganography and Digital Watermarking -Book

For quite a long time, computer security was a rather narrow field of study that was populated ma... more For quite a long time, computer security was a rather narrow field of study that was populated mainly by theoretical computer scientists, electrical engineers, and applied mathematicians. With the proliferation of open systems in general, and the Internet and the World Wide Web (WWW) in particular, this situation has changed fundamentally. Today, computer and network practitioners are equally interested in computer security, since they require technologies and solutions that can be used to secure applications related to electronic commerce (e-commerce). Against this background, the field of computer security has become very broad and includes many topics of interest. The aim of this series is to publish state-of-the-art, high-standard technical books on topics related to computer security. Further information about the series can be found on the WWW by following the URL:

Research paper thumbnail of Stefan Katzenbeisser Information Hiding Techniques for Steganography and Digital Watermarking -Book

For quite a long time, computer security was a rather narrow field of study that was populated ma... more For quite a long time, computer security was a rather narrow field of study that was populated mainly by theoretical computer scientists, electrical engineers, and applied mathematicians. With the proliferation of open systems in general, and the Internet and the World Wide Web (WWW) in particular, this situation has changed fundamentally. Today, computer and network practitioners are equally interested in computer security, since they require technologies and solutions that can be used to secure applications related to electronic commerce (e-commerce). Against this background, the field of computer security has become very broad and includes many topics of interest. The aim of this series is to publish state-of-the-art, high-standard technical books on topics related to computer security. Further information about the series can be found on the WWW by following the URL:

Log In