Free Delivery Over $100
3712 books were found.
Intended for a graduate-level course in Cryptographic Engineering, this text will teach students with a basic knowledge... Read More >>
"An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The... Read More >>
Online Business Security Systems applies the concept of synchronization to security of global heterogeneous and... Read More >>
Presents some of the important research trends reflected in advances in computer security, including: security protocol... Read More >>
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations... Read More >>
This book provides a thorough description of hypercomputation, covering all attempts at devising conceptual hypermachines... Read More >>
Sta- ing from a few Mb/s single channel systems, a fast and constant technological development has led to the actual... Read More >>
Identity technologies are problematic, and many see light at the end of the identity theft tunnel. The light is... Read More >>
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions.... Read More >>
In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations... Read More >>
Presents information on the use of several algebraic techniques in analyzing the AES. This book is useful for academic... Read More >>
Power analysis attacks allow the extraction of secret information from smart cards. In all these applications, the... Read More >>
Covers a majority of the subjects that make up cryptology, including symmetric or public-key cryptography, cryptographic... Read More >>
Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing... Read More >>
Read More >>
It raised my interest, and after reading some early research papers on the topic, I thought: “There must exist better... Read More >>
This book presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence... Read More >>
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009),... Read More >>
Introduction The International Federation for Information Processing (IFIP) is a non-profit umbrella organization... Read More >>
Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications... Read More >>
Information and Its Role in Nature presents an in-depth interdisciplinary discussion of the concept of information... Read More >>
This book focuses on the analysis and design of low-density parity-check (LDPC) coded modulations, which are becoming... Read More >>
Colleges give degrees in information science and information management. The purpose of this volume is to introduce... Read More >>