Free Delivery Over $100
3712 books were found.
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional... Read More >>
This book gives a detailed description of the handover issues in DVB-H networks, in converged DVB-H/UMTS networks... Read More >>
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers... Read More >>
This brilliantly structured and comprehensive volume provides exhaustive explanations of the concepts and philosophy... Read More >>
The protocols include:- Secure address resolution - Weak hop integrity - Strong hop integrity using soft sequence... Read More >>
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. Read More >>
The main theme in this book is to teach modeling based on the principle that the objective is to extract the information... Read More >>
Discusses wireless security issues from physical layer to application layer. This book identifies important vulnerabilities... Read More >>
Company network administrators are compelled today to aggressively pursue a robust network security regime. This... Read More >>
Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years,... Read More >>
In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating... Read More >>
Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e.,... Read More >>
Foundations and Applications of Sensor Management presents the emerging theory of sensor management with applications... Read More >>
One of the most remarkable and beautiful theorems in coding theory is Gleason's 1970 theorem about the weight enumerators... Read More >>
P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible... Read More >>
In the traditional search model an unknown element is sought in a ?nite set, based on the information that the unknown... Read More >>
This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume... Read More >>
The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal,... Read More >>
Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting... Read More >>
Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses... Read More >>
The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties... Read More >>
This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. It reviews a series of methods... Read More >>
Privacy preserving data mining implies the ""mining"" of knowledge from distributed data without violating the privacy... Read More >>
This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc... Read More >>
This book proposes a number of techniques to perform data mining tasks in a privacy-preserving way. The survey information... Read More >>