Free Delivery Over $100
3712 books were found.
We present a study of cooperative computing with the focus on modeling distributed computing settings, algorithmic... Read More >>
This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011,... Read More >>
Security experts and trainers cover all exam objectives for this new IT security certification in detail and provide... Read More >>
A guide that covers official objectives for Exam SY0-301. It features all exam topics, including: Network Basics... Read More >>
Originally used in military networks to bypass jamming and interception, spread-spectrum systems are now at the... Read More >>
Presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on... Read More >>
Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols,... Read More >>
This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy,... Read More >>
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and... Read More >>
The papers address all technical and practical aspects of security and its applications for wired and wireless networks... Read More >>
The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models,... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information... Read More >>
Dalle origini a oggi, i videogiochi hanno dimostrato di aver acquisito una forte identità espressiva, delineando... Read More >>
This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application... Read More >>
Visual Cryptography and Secret Image Sharing Read More >>
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing,... Read More >>
The Science of Secrecy from Ancient Egypt to Quantum Cryptography From the best-selling author of Fermat’s... Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network... Read More >>
A book covering theoretical and algorithmic design for digital content/data security. Read More >>
The work introduces the fundamentals concerning the measure of discrete information, the modeling of discrete sources... Read More >>