Free Delivery Over $100
3712 books were found.
Is knowledge an economic good? Cumulation of knowledge is a key determinant of economic growth, but only recently... Read More >>
Modern cryptography depends heavily on number theory, with primality test ing, factoring, discrete logarithms (indices),... Read More >>
This volume contains review articles and original results obtained in various fields of modern science using mathematical... Read More >>
It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses... Read More >>
The theory of algebraic function fields over finite fields has its origins in number theory. Read More >>
Genetic programming (GP), one of the most advanced forms of evolutionary computation, has been highly successful... Read More >>
Shall we be destined to the days of eternity, on holy-days,as well as working days, to be shewing the RELICKS OF... Read More >>
Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book deals... Read More >>
As individual needs have arisen in the fields of physics, electrical engineering and computational science, each... Read More >>
The second edition contains corrections, revisions and new material, including a complete description of the AES,... Read More >>
Face recognition has been actively studied over years. This work provides a comprehensive review of this biometric,... Read More >>
This is especially so for video conferencing, thin-client computing and Internet cafes.CryptoGraphics: Exploiting... Read More >>
Features proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity,... Read More >>
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS... Read More >>
Table of Contents: Introduction / Mathematical Preliminaries / Describing Timed System Behavior / Timed Automata... Read More >>
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field,... Read More >>
The IPSec may be used in three different security - mains: Virtual private networks, Application-level security,... Read More >>
The role open-source geospatial software plays in data handling within the spatial information technology industry... Read More >>
This book deals with algorithmic problems concerning binary quadratic forms 2 2 f(X,Y)= aX +bXY +cY with integer... Read More >>
Conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned... Read More >>
Describes research results and innovative applications in the interdisciplinary field of critical infrastructure... Read More >>
An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway... Read More >>
Orthogonal Frequency Division Multiplexing for Wireless Communications is an edited volume with contributions by... Read More >>
This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC... Read More >>
In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems... Read More >>