Free Delivery Over $100
4112 books were found.
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and... Read More >>
Behandelt die signaltheoretischen Grundlagen der irregulären Abtastung ausgehend von einer exakten funktionalanalytischen... Read More >>
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012,... Read More >>
This new book offers a new, theoretical approach to information dynamics, i.e., information processing in complex... Read More >>
A framework for network security which may be used by the military, government, industry, and academia network personnel.... Read More >>
This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks... Read More >>
The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes... Read More >>
The papers are organized in topical sections on applied cryptography and security protocols, access control and... Read More >>
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting... Read More >>
Table of Contents: Introduction / Computational Models / Gathering and Convergence / Pattern Formation / Scatterings... Read More >>
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases,... Read More >>
This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security... Read More >>
This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec... Read More >>
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information... Read More >>
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012,... Read More >>
This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded... Read More >>
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on... Read More >>
Read More >>
<p>The best fully integrated study system available for CompTIA Advanced Security Practitioner (CASP) Exam CAS-001<p>With... Read More >>
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul,... Read More >>
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital... Read More >>
This book constitutes the refereed proceedings of the 16th International Conference on Developments in Language... Read More >>