Free Delivery Over $100
3712 books were found.
The first volume, Relationships in the Organization of Knowledge (Bean & Green, 200 I), examines the role of relationships... Read More >>
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information... Read More >>
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical... Read More >>
This volume contains all of the papers presented at the ""Advanced In- ternational Workshop on Sequences: Combinatorics,... Read More >>
This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference,... Read More >>
The means and ends of information theory and computational complexity have grown significantly closer over the past... Read More >>
This work presents new and old constructions of nearrings. Links between properties of the multiplicative of nearrings... Read More >>
Ziel dieses Buches ist eine leicht verstandliche Einfuhrung in die Grundlagen und Anwendungen der Kanalcodierung.... Read More >>
This all-new, exam-focused study guide from bestselling certification author and IT consultant Glen Clarke includes... Read More >>
Security experts and trainers cover all exam objectives for this new IT security certification in detail and provide... Read More >>
This book is the 7th volume in the annual series produced by the International Federation for Information Processing... Read More >>
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded... Read More >>
This book constitutes the refereed proceedings of the 5th Provable Security Conference held in in Xi'an, China,... Read More >>
This proceedings is a representation of decades of reasearch, teaching and application in the field. Image Processing,... Read More >>
With over 300 new entries, appearing in an A-Z format, this title provides access to information on various aspects... Read More >>
Read More >>
This book constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011,... Read More >>
This book explores several unsolved problems in coding theory. Employing Sage - a free open-source mathematics program... Read More >>
This book contains extended and revised versions of the best papers presented at the 17th IFIP WG 10.5/IEEE International... Read More >>
This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle,WA,... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing,... Read More >>
Constitutes the refereed proceedings of the IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop on... Read More >>
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish,... Read More >>