Free Delivery Over $100
3712 books were found.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security,... Read More >>
Read More >>
The only book to provide a unified view of the interplay between computational number theory and cryptographyComputational... Read More >>
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: <ul>... Read More >>
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT... Read More >>
Table of Contents: Introduction / Routing in a Graph: Correctness / Routing in a Graph: Complexity / Routing and... Read More >>
This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed... Read More >>
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With... Read More >>
"""Thorough and comprehensive coverage from one of the foremost experts in browser security."" —Tavis Ormandy, Google... Read More >>
The objective of the present edition of this monograph is the same as that of earlier editions, namely, to provide... Read More >>
Designed as the most comprehensive CompTIA Security+ self-study package, this Boxed Set includes CompTIA Security+... Read More >>
The papers cover a wide range of topics in the field of post-quantum public key cryptosystems such as cryptosystems... Read More >>
This book outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities... Read More >>
A dialogue between theory and practice has been hindered by two pro foundly different conceptions of a data source:... Read More >>
Further, the kind and level of sophistication of mathematics applied in various sciences has changed drastically... Read More >>
DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. Read More >>
This book constitutes the refereed post-proceedings of the Second International Conference on High Performance Networking,... Read More >>
With over 300 new entries, appearing in an A-Z format, this title provides access to information on various aspects... Read More >>
This authoritative exam guide prepares readers to take the first step towards the coveted CISSP certification-the... Read More >>
This volume represents the refereed proceedings of the ""Sixth International Conference on Finite Fields and Applications... Read More >>
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC... Read More >>
The mathematical principles underlying adaptive signal processing were initially fascinating and were my first experience... Read More >>