Free Delivery Over $100
3712 books were found.
This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks... Read More >>
The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes... Read More >>
This book is about Transparent Intensional Logic, the brainchild of Pavel Tichý. But we, the three authors, have... Read More >>
The papers are organized in topical sections on applied cryptography and security protocols, access control and... Read More >>
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting... Read More >>
Table of Contents: Introduction / Computational Models / Gathering and Convergence / Pattern Formation / Scatterings... Read More >>
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases,... Read More >>
This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security... Read More >>
This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec... Read More >>
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information... Read More >>
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012,... Read More >>
This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on... Read More >>
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012,... Read More >>
Read More >>
<p>The best fully integrated study system available for CompTIA Advanced Security Practitioner (CASP) Exam CAS-001<p>With... Read More >>
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul,... Read More >>
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital... Read More >>
This book constitutes the refereed proceedings of the 16th International Conference on Developments in Language... Read More >>
Deciding which coding scheme to employ, how to design a new scheme, or how to improve an existing system? This summary... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on... Read More >>
This is an all-new, exam-focused study guide on a new, high-level security credential from CompTIA, the certifying... Read More >>
Interference Cancellation Using Space-Time Processing and Precoding Design introduces original design methods to... Read More >>