Coding theory & cryptology books

3712 books were found.

Creation and Transfer of Knowledge: Institutions and Incentives

Creation and Transfer of Knowledge: Institutions and...

Author: Giorgio Barba Navaretti ,  Partha Dasgupta
ISBN: 9783642084089
Format: Paperback
$351.12

Is knowledge an economic good? Cumulation of knowledge is a key determinant of economic growth, but only recently...  Read More >>

Number Theory for Computing

Number Theory for Computing

Author: M. E. Hellmann ,  Song Y. Yan
ISBN: 9783642077104
Format: Paperback
$197.87

Modern cryptography depends heavily on number theory, with primality test­ ing, factoring, discrete logarithms (indices),...  Read More >>

Mathematical Modeling: Problems, Methods, Applications

Mathematical Modeling: Problems, Methods, Applications...

Author: Ludmilla A. Uvarova ,  Anatolii V. Latyshev
ISBN: 9781441933713
Format: Paperback
$630.96

This volume contains review articles and original results obtained in various fields of modern science using mathematical...  Read More >>

Computer Viruses and Malware

Computer Viruses and Malware

Author: John Aycock
ISBN: 9781441940162
Format: Paperback
$287.76

It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses...  Read More >>

Topics in Geometry, Coding Theory and Cryptography

Topics in Geometry, Coding Theory and Cryptography

Author: Arnaldo Garcia ,  Henning Stichtenoth
ISBN: 9789048173457
Format: Paperback
$145.17

The theory of algebraic function fields over finite fields has its origins in number theory.  Read More >>

Foundations of Genetic Programming

Foundations of Genetic Programming

Author: William B. Langdon ,  Riccardo Poli
ISBN: 9783642076329
Format: Paperback
$184.67

Genetic programming (GP), one of the most advanced forms of evolutionary computation, has been highly successful...  Read More >>

Algorithmic Information Theory: Mathematics of Digital Information Processing

Algorithmic Information Theory: Mathematics of Digital...

Author: Peter Seibt
ISBN: 9783642069789
Format: Paperback
$419.76

Shall we be destined to the days of eternity, on holy-days,as well as working days, to be shewing the RELICKS OF...  Read More >>

The Codes of Life: The Rules of Macroevolution

The Codes of Life: The Rules of Macroevolution

Author: Marcello Barbieri
ISBN: 9789048176113
Format: Paperback
$578.16

Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book deals...  Read More >>

Asymmetry: The Foundation of Information

Asymmetry: The Foundation of Information

Author: Scott J. Muller
ISBN: 9783642089329
Format: Paperback
$340.56

As individual needs have arisen in the fields of physics, electrical engineering and computational science, each...  Read More >>

Introduction to Cryptography: Principles and Applications

Introduction to Cryptography: Principles and Applications...

Author: Hans Delfs ,  Helmut Knebl
ISBN: 9783642080401
Format: Paperback
$184.67

The second edition contains corrections, revisions and new material, including a complete description of the AES,...  Read More >>

Unconstrained Face Recognition

Unconstrained Face Recognition

Author: Shaohua Kevin Zhou ,  Rama Chellappa
ISBN: 9781441938909
Format: Paperback
$340.56

Face recognition has been actively studied over years. This work provides a comprehensive review of this biometric,...  Read More >>

CryptoGraphics: Exploiting Graphics Cards For Security

CryptoGraphics: Exploiting Graphics Cards For Security...

Author: Debra Cook ,  Angelos D. Keromytis
ISBN: 9781441939647
Format: Paperback
$303.60

This is especially so for video conferencing, thin-client computing and Internet cafes.CryptoGraphics: Exploiting...  Read More >>

Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference

Security Management, Integrity, and Internal Control...

Author: Steve Furnell ,  Paul Dowland
ISBN: 9781441940056
Format: Paperback
$393.36

Features proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity,...  Read More >>

Primality Testing and Integer Factorization in Public-Key Cryptography

Primality Testing and Integer Factorization in Public-Key...

Author: Song Y. Yan
ISBN: 9781441945860
Format: Paperback
$314.16

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS...  Read More >>

The Theory of Timed I/O Automata, Second Edition

The Theory of Timed I/O Automata, Second Edition

Author: Dilsun Kaynar ,  Nancy Lynch
ISBN: 9783031008757
Format: Paperback
$100.29

Table of Contents: Introduction / Mathematical Preliminaries / Describing Timed System Behavior / Timed Automata...  Read More >>

Botnet Detection: Countering the Largest Security Threat

Botnet Detection: Countering the Largest Security Threat...

Author: Wenke Lee ,  Cliff Wang
ISBN: 9781441943309
Format: Paperback
$446.16

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field,...  Read More >>

Synchronizing Internet Protocol Security (SIPSec)

Synchronizing Internet Protocol Security (SIPSec)

Author: Charles A. Shoniregun
ISBN: 9781441940995
Format: Paperback
$366.96

The IPSec may be used in three different security - mains: Virtual private networks, Application-level security,...  Read More >>

Open Source Approaches in Spatial Data Handling

Open Source Approaches in Spatial Data Handling

Author: Brent Hall ,  Michael G. Leahy
ISBN: 9783642094255
Format: Paperback
$419.76

The role open-source geospatial software plays in data handling within the spatial information technology industry...  Read More >>

Binary Quadratic Forms: An Algorithmic Approach

Binary Quadratic Forms: An Algorithmic Approach

Author: Johannes Buchmann ,  Ulrich Vollmer
ISBN: 9783642079719
Format: Paperback
$287.76

This book deals with algorithmic problems concerning binary quadratic forms 2 2 f(X,Y)= aX +bXY +cY with integer...  Read More >>

Biometric User Authentication for IT Security: From Fundamentals to Handwriting

Biometric User Authentication for IT Security: From...

Author: Claus Vielhauer
ISBN: 9781441938732
Format: Paperback
$330.00

Conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned...  Read More >>

Critical Infrastructure Protection II

Critical Infrastructure Protection II

Author: Mauricio Papa ,  Sujeet Shenoi
ISBN: 9781441946959
Format: Paperback
$525.36

Describes research results and innovative applications in the interdisciplinary field of critical infrastructure...  Read More >>

Secure Key Establishment

Secure Key Establishment

Author: Kim-Kwang Raymond Choo
ISBN: 9781441946898
Format: Paperback
$314.16

An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway...  Read More >>

Orthogonal Frequency Division Multiplexing for Wireless Communications

Orthogonal Frequency Division Multiplexing for Wireless...

Author: Ye Geoffrey Li ,  Gordon L. Stuber
ISBN: 9781441939708
Format: Paperback
$353.76

Orthogonal Frequency Division Multiplexing for Wireless Communications is an edited volume with contributions by...  Read More >>

New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa

New Approaches for Security, Privacy and Trust in Complex...

Author: Hein Venter ,  Mariki Eloff
ISBN: 9781441944337
Format: Paperback
$525.36

This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC...  Read More >>

Intrusion Detection Systems

Intrusion Detection Systems

Author: Roberto Di Pietro ,  Luigi V. Mancini
ISBN: 9781441945853
Format: Paperback
$393.36

In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List