Free Delivery Over $100
3712 books were found.
This volume brings together a collection of essays on the history and philosophy of probability and statistics by... Read More >>
This book can serve several purposes. It can be used as a reference and for self-study by readers who want to learn... Read More >>
In the transmission of information storage, preventing noise and/or eavesdropping is essential. This undergraduate... Read More >>
This detailed introduction presents the underlying theory and describes how to design and implement practical iterative... Read More >>
This book outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities... Read More >>
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel... Read More >>
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to... Read More >>
The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols,... Read More >>
In passato, l’arte della “scrittura nascosta” (meglio nota come crittografia) era per lo più riferita ad un insieme... Read More >>
Read More >>
This book contains extended and revised versions of the best papers presented at the 18th IFIP WG 10.5/IEEE International... Read More >>
The CDC conjecture (and its numerous variants) is considered one of the major open problems in graph theory. This... Read More >>
Written by leaders in the field of IT security higher education, the new edition of this full-color text covers... Read More >>
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009,... Read More >>
Digital watermarking is one of the widely used techniques used in the world in the area of information security.This... Read More >>
The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean... Read More >>
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP... Read More >>
An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen... Read More >>
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop... Read More >>
Die Kryptologie, eine jahrtausendealte ""Geheimwissenschaft"", gewinnt zusehends praktische Bedeutung für den Schutz... Read More >>
Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on... Read More >>
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area... Read More >>