Free Delivery Over $100
3712 books were found.
This book constitutes refereed proceedings of the 9th Conference on Information and Communication Technologies of... Read More >>
This book constitutes revised selected papers from the 11th International Workshop on Constructive Side-Channel... Read More >>
This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec... Read More >>
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference... Read More >>
This book covers technical details of mobile devices and transmissions as well as forensic methods for extracting... Read More >>
This book covers decades of digital eavesdropping and manipulation of agencies to Stuxnet, the world’s first use... Read More >>
This book constitutes the post-conference proceedings of the 17th International Conference on Information Security... Read More >>
Read More >>
This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. . Both... Read More >>
This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends... Read More >>
If you need to get a grip on Ethereum, one of the biggest applications of blockchain technology, The Only Ethereum... Read More >>
The NFT Handbook is a detailed guide on how to create, sell, and buy non-fungible tokens without the need for a... Read More >>
This textbook assumes very little knowledge of programming so whether you have dabbled with a little JavaScript,... Read More >>
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in... Read More >>
This book constitutes the conference proceedings of the 10th International Conference on Network Games, Control... Read More >>
This book constitutes the refereed post-conference proceedings of the IFIP TC 3 Open Conference on Computers in... Read More >>
This book constitutes the proceedings of the 7th International Conference on Cryptology and Information Security... Read More >>
This monograph describes and implements partially homomorphic encryption functions using a unified notation. After... Read More >>
If you’re browsing the web, using public APIs, making and receiving electronic payments, registering and logging... Read More >>
This book constitutes the refereed proceedings of four workshops held at the 25th International Conference on Financial... Read More >>