Coding theory & cryptology books

4214 books were found.

Passive and Active Measurement: 27th International Conference, PAM 2026, Virtual Event, March 23-25, 2026, Proceedings

Passive and Active Measurement: 27th International Conference,...

Author: Simone Ferlin-Reiter ,  Romain Fontugne
ISBN: 9783032182678
Format: Paperback
$290.37

This book constitutes the proceedings of the 27th International Conference on Passive and Active Measurement, PAM...  Read More >>

Cyber Defense: Advanced Strategies and Techniques to Stay Ahead of the Cyber Threats Curve

Cyber Defense: Advanced Strategies and Techniques to...

Author: Anahita Tasdighi
ISBN: 9781394375905
Format: Hardback
$182.95

Equips cybersecurity professionals with advanced strategies to anticipate, mitigate, and respond to evolving digital...  Read More >>

Security and Privacy in Social Networks and Big Data: 11th International Symposium, SocialSec 2025, Wuhan, China, December 5–7, 2025, Proceedings

Security and Privacy in Social Networks and Big Data:...

Author: Liming Zhai ,  Qing Guo
ISBN: 9789819570263
Format: Paperback
$171.57

This book LNCS 16327 constitutes the referred proceedings of the 11th International Symposium on Security and Privacy...  Read More >>

An Introduction to Silent Secure Computation

An Introduction to Silent Secure Computation

Author: Geoffroy Couteau
ISBN: 9783032070883
Format: Paperback
$145.17

Secure computation allows any number of mutually distrustful parties to jointly run an arbitrary computation on...  Read More >>

Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems XVIII: International Workshop, COINE 2025, Detroit, MI, USA, May 20, 2025, Revised Selected Papers

Coordination, Organizations, Institutions, Norms, and...

Author: Sz-Ting Tzeng ,  Davide Dell’Anna
ISBN: 9783032175410
Format: Paperback
$145.17

This volume constitutes the revised selected papers of the 29th International Workshop on Coordination, Organizations,...  Read More >>

Computer Security. ESORICS 2025 International Workshops: AutonomousCyber 2025, CPS4CIP 2025, DisA 2025, HS3 2025, MIST 2025, Toulouse, France, September 25–26, 2025, Revised Selected Papers, Part III

Computer Security. ESORICS 2025 International Workshops:...

Author: Romain Laborde ,  Joaquin Garcia-Alfaro
ISBN: 9783032161642
Format: Paperback
$237.57

The three-volume set LNCS 16231, LNCS 16232, and LNCS 16233 constitutes the refereed proceedings of twelve International...  Read More >>

Mathematics for the Digital Systems Engineer: Essentials for Modern Cryptography, Computer Security and Communications Technology

Mathematics for the Digital Systems Engineer: Essentials...

Author: Chris J. Mitchell (University of London, UK)
ISBN: 9781394396528
Format: Hardback
$190.95

Straightforward resource on the mathematics underpinning the AI/digital world Mathematics for the Digital Systems...  Read More >>

Coding for Erasure Channels

Coding for Erasure Channels

Author: Enrico Paolini (University of Bologna) ,  Gianluigi Liva (German Aerospace Center, Wessling)
ISBN: 9781107131552
Format: Hardback
$258.75

A unique resource for analyzing, designing and implementing erasure codes for future computer networks, with an...  Read More >>

Neural Symbolic Knowledge Graph Reasoning: A Pathway Towards Neural Symbolic AI

Neural Symbolic Knowledge Graph Reasoning: A Pathway...

Author: Lihui Liu ,  Hanghang Tong
ISBN: 9783032158574
Format: Hardback
$118.77

This book explores various aspects of knowledge graph reasoning to solve different tasks, encompassing first, traditional...  Read More >>

Unveiling the Art of Steganography: A Modern Approach

Unveiling the Art of Steganography: A Modern Approach...

Author: Urmila Pilania ,  Manoj Kumar
ISBN: 9781032823652
Format: Paperback
$134.52

The book delves into the fundamentals of steganography, the ancient art of hiding messages in plain sight. From...  Read More >>

Unveiling the Art of Steganography: A Modern Approach

Unveiling the Art of Steganography: A Modern Approach...

Author: Urmila Pilania ,  Manoj Kumar
ISBN: 9781032821078
Format: Hardback
$310.50

The book delves into the fundamentals of steganography, the ancient art of hiding messages in plain sight. From...  Read More >>

Secure IT Systems: 30th Nordic Conference, NordSec 2025, Tartu, Estonia, November 12-13, 2025, Proceedings

Secure IT Systems: 30th Nordic Conference, NordSec 2025,...

Author: Raimundas Matulevičius ,  Liina Kamm
ISBN: 9783032147813
Format: Paperback
$197.97

This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025,...  Read More >>

AI-based 3D Point Cloud Coding: Methods, Standards, and Applications

AI-based 3D Point Cloud Coding: Methods, Standards,...

Author: Wei Gao
ISBN: 9789819506590
Format: Hardback
$475.17

mso-bidi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-bidi-theme-font:...  Read More >>

The DevSecOps Bible: Automating Security in Cloud-Native Pipelines, Kubernetes, and Hybrid Clouds

The DevSecOps Bible: Automating Security in Cloud-Native...

Author: Rowan Keller
ISBN: 9798249655662
Format: Paperback
$131.97

Ship faster. Break less. Sleep more. If your ""security process"" looks like a last-minute spreadsheet, a panicked...  Read More >>

OpenClaw / Clawdbot for AI Automation: Design, Deploy, and Secure Personal AI Agents That Handle Messages, Tasks, and Reports While You Focus on High-Value Work

OpenClaw / Clawdbot for AI Automation: Design, Deploy,...

Author: Cameron McLucas
ISBN: 9798249399023
Format: Paperback
$66.00

OpenClaw / Clawdbot for AI Automation: Design, Deploy, and Secure Personal AI Agents That Handle Messages, Tasks,...  Read More >>

Human-Centered Security: How to Design Systems That Are Both Safe and Usable

Human-Centered Security: How to Design Systems That...

Author: Heidi Trost ,  Simran Singh
ISBN: 9798228825987
Format: Audio
$121.31

In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching...  Read More >>

Human-Centered Security: How to Design Systems That Are Both Safe and Usable

Human-Centered Security: How to Design Systems That...

Author: Heidi Trost ,  Simran Singh
ISBN: 9798228825970
Format: Audio
$95.01

In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching...  Read More >>

The DarkWhale Protocol: My Crypto Journey With Satoshi

The DarkWhale Protocol: My Crypto Journey With Satoshi...

Author: Marco Beffa
ISBN: 9789948650324
Format: Hardback
$92.37

A mysterious guide. A hidden protocol. A descent into the digital unknown. Welcome to the journey. The DarkWhale...  Read More >>

Cybersecurity Risk Management: Embedded Quality as Your Shield from Modern Threats

Cybersecurity Risk Management: Embedded Quality as Your...

Author: Jayet Moon ,  Jeet Shah
ISBN: 9781636942087
Format: Paperback
$184.80

This book is your guide to building secure, resilient systems that meet the highest standards of quality and compliance-because...  Read More >>

Quantum Ready: The Enterprise Guide to Post-Quantum Cryptographic Readiness

Quantum Ready: The Enterprise Guide to Post-Quantum...

Author: Walt Powell
ISBN: 9781041166696
Format: Paperback
$134.52

Quantum Ready is not just a warning, it’s a field guide for the era of quantum disruption. As quantum computing...  Read More >>

Post-Quantum Cryptography Migration: Preparing Enterprise Systems for Quantum Computing Threats

Post-Quantum Cryptography Migration: Preparing Enterprise...

Author: Adrian Volk
ISBN: 9798233541414
Format: Paperback
$79.17

Post-quantum cryptography is not a future upgrade. It is a structural migration of trust happening now, beneath...  Read More >>

Quantum Ready: The Enterprise Guide to Post-Quantum Cryptographic Readiness

Quantum Ready: The Enterprise Guide to Post-Quantum...

Author: Walt Powell
ISBN: 9781041166689
Format: Hardback
$310.50

Quantum Ready is not just a warning, it’s a field guide for the era of quantum disruption. As quantum computing...  Read More >>

Cyber Security & AI v2: How AI affects Cyber Security

Cyber Security & AI v2: How AI affects Cyber Security...

Author: Mark Hayward
ISBN: 9798246847992
Format: Paperback
$52.77

This eBook explores the critical intersection of artificial intelligence and cybersecurity, providing a comprehensive...  Read More >>

Latest Reading Guide

MRG 26 2

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List