Free Delivery Over $100
3712 books were found.
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies... Read More >>
We can beam this information anywhere, to mobile workers, to field engineers, to a track loading apples, to ships... Read More >>
This is a comprehensive, up-to-date revision of the market-leading CISSP training resource from the #1 name in IT... Read More >>
This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech... Read More >>
Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained... Read More >>
Die Sicherheit einer IT-Komponente hängt meist direkt von einer oder mehreren anderen Komponenten ab, wobei diese... Read More >>
This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99,... Read More >>
Recently, much attention has been paid to image processing with multiresolution and hierarchical structures such... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT... Read More >>
Foreword by Dieter Jungnickel Finite Commutative Rings and their Applications answers a need for an introductory... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security,... Read More >>
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in... Read More >>
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building... Read More >>
Provides a treatment of the fundamentals of multisensor decision and estimation fusion in order to deal with general... Read More >>
Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining... Read More >>
Jaynes and Myron Tribus initiated a series of workshops to exchange ideas and recent developments in technical aspects... Read More >>
This book constitutes the proceedings of the 5th International Conference on Advances in Information Technology,... Read More >>
Das Buch bietet einen umfassenden Überblick über die Grundlagen moderner kryptographischer Verfahren und ihre programmtechnische... Read More >>
This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application... Read More >>
High performance computing consumes and generates vast amounts of data, and the storage, retrieval, and transmission... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on... Read More >>
Focuses on three areas of practice and research progress in information technologies: Methods of Artificial Intelligence;... Read More >>
""Digital Communications"" presents the theory and application of the philosophy of Digital Communication systems... Read More >>
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence... Read More >>
This modem introduction to the foundations of logic, mathematics, and computer science answers frequent questions... Read More >>