Coding theory & cryptology books

3712 books were found.

Security for Wireless Sensor Networks

Security for Wireless Sensor Networks

Author: Donggang Liu ,  Peng Ning
ISBN: 9781441940988
Format: Paperback
$366.96

The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional...  Read More >>

Handover in DVB-H: Investigations and Analysis

Handover in DVB-H: Investigations and Analysis

Author: Xiaodong Yang
ISBN: 9783642097386
Format: Paperback
$314.16

This book gives a detailed description of the handover issues in DVB-H networks, in converged DVB-H/UMTS networks...  Read More >>

Security for Telecommunications Networks

Security for Telecommunications Networks

Author: Patrick Traynor ,  Patrick McDaniel
ISBN: 9781441944382
Format: Paperback
$263.97

This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers...  Read More >>

Information Criteria and Statistical Modeling

Information Criteria and Statistical Modeling

Author: Sadanori Konishi ,  Genshiro Kitagawa
ISBN: 9781441924568
Format: Paperback
$237.47

This brilliantly structured and comprehensive volume provides exhaustive explanations of the concepts and philosophy...  Read More >>

Hop Integrity in the Internet

Hop Integrity in the Internet

Author: Chin-Tser Huang ,  Mohamed G. Gouda
ISBN: 9781441937445
Format: Paperback
$237.47

The protocols include:- Secure address resolution - Weak hop integrity - Strong hop integrity using soft sequence...  Read More >>

Image and Video Encryption: From Digital Rights Management to Secured Personal Communication

Image and Video Encryption: From Digital Rights Management...

Author: Andreas Uhl ,  Andreas Pommer
ISBN: 9781441936257
Format: Paperback
$303.60

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data.  Read More >>

Information and Complexity in Statistical Modeling

Information and Complexity in Statistical Modeling

Author: Jorma Rissanen
ISBN: 9781441922670
Format: Paperback
$145.07

The main theme in this book is to teach modeling based on the principle that the objective is to extract the information...  Read More >>

Wireless Network Security

Wireless Network Security

Author: Yang Xiao ,  Xuemin Shen
ISBN: 9781441939197
Format: Paperback
$366.96

Discusses wireless security issues from physical layer to application layer. This book identifies important vulnerabilities...  Read More >>

Network Security Policies and Procedures

Network Security Policies and Procedures

Author: Douglas W. Frye
ISBN: 9781441940476
Format: Paperback
$366.96

Company network administrators are compelled today to aggressively pursue a robust network security regime. This...  Read More >>

Multivariate Public Key Cryptosystems

Multivariate Public Key Cryptosystems

Author: Jintai Ding ,  Jason E. Gower
ISBN: 9781441940773
Format: Paperback
$303.60

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years,...  Read More >>

Understanding Intrusion Detection through Visualization

Understanding Intrusion Detection through Visualization...

Author: Stefan Axelsson ,  David Sands
ISBN: 9781441939067
Format: Paperback
$290.37

In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating...  Read More >>

Malware Detection

Malware Detection

Author: Mihai Christodorescu ,  Somesh Jha
ISBN: 9781441940957
Format: Paperback
$472.56

Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e.,...  Read More >>

Foundations and Applications of Sensor Management

Foundations and Applications of Sensor Management

Author: Alfred Olivier Hero ,  David Castañón
ISBN: 9781441939111
Format: Paperback
$448.77

Foundations and Applications of Sensor Management presents the emerging theory of sensor management with applications...  Read More >>

Self-Dual Codes and Invariant Theory

Self-Dual Codes and Invariant Theory

Author: Gabriele Nebe ,  Eric M. Rains
ISBN: 9783642068010
Format: Paperback
$366.96

One of the most remarkable and beautiful theorems in coding theory is Gleason's 1970 theorem about the weight enumerators...  Read More >>

Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings

Cryptology and Network Security: 9th International Conference,...

Author: Swee-Huay Heng ,  Rebecca N. Wright
ISBN: 9783642176180
Format: Paperback
$219.12

P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible...  Read More >>

Entropy, Search, Complexity

Entropy, Search, Complexity

Author: Imre Csiszár ,  Gyula O.H. Katona
ISBN: 9783642068997
Format: Paperback
$366.96

In the traditional search model an unknown element is sought in a ?nite set, based on the information that the unknown...  Read More >>

Insider Attack and Cyber Security: Beyond the Hacker

Insider Attack and Cyber Security: Beyond the Hacker...

Author: Salvatore J. Stolfo ,  Steven M. Bellovin
ISBN: 9781441945891
Format: Paperback
$287.76

This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume...  Read More >>

The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society, Karlstad University, Sweden, August 4-10, 2007

The Future of Identity in the Information Society: Proceedings...

Author: Simone Fischer-Hübner ,  Penny Duquenoy
ISBN: 9781441946294
Format: Paperback
$393.36

The increasing diversity of Infonnation Communication Technologies and their equally diverse range of uses in personal,...  Read More >>

Vulnerability Analysis and Defense for the Internet

Vulnerability Analysis and Defense for the Internet...

Author: Abhishek Singh ,  B. Singh
ISBN: 9781441944986
Format: Paperback
$261.36

Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting...  Read More >>

Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and...

Author: Christopher Kruegel ,  Fredrik Valeur
ISBN: 9781441936240
Format: Paperback
$287.76

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses...  Read More >>

Privacy-Respecting Intrusion Detection

Privacy-Respecting Intrusion Detection

Author: Ulrich Flegel
ISBN: 9781441941756
Format: Paperback
$261.36

The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties...  Read More >>

Preserving Privacy in On-Line Analytical Processing (OLAP)

Preserving Privacy in On-Line Analytical Processing...

Author: Lingyu Wang ,  Sushil Jajodia
ISBN: 9781441942784
Format: Paperback
$287.76

This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. It reviews a series of methods...  Read More >>

Privacy Preserving Data Mining

Privacy Preserving Data Mining

Author: Jaideep Vaidya ,  Christopher W. Clifton
ISBN: 9781441938473
Format: Paperback
$290.37

Privacy preserving data mining implies the ""mining"" of knowledge from distributed data without violating the privacy...  Read More >>

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks

Secure Localization and Time Synchronization for Wireless...

Author: Radha Poovendran ,  Cliff Wang
ISBN: 9781441940964
Format: Paperback
$393.36

This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc...  Read More >>

Privacy-Preserving Data Mining: Models and Algorithms

Privacy-Preserving Data Mining: Models and Algorithms...

Author: Charu C. Aggarwal ,  Philip S. Yu
ISBN: 9781441943712
Format: Paperback
$340.56

This book proposes a number of techniques to perform data mining tasks in a privacy-preserving way. The survey information...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List