Free Delivery Over $100
3712 books were found.
This book constitutes the refereed proceedings of the 10th International Conference on the Theory and Application... Read More >>
This book addresses the issue of Machine Learning (ML) attacks on Integrated Circuits through Physical Unclonable... Read More >>
This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto... Read More >>
The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual... Read More >>
Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are... Read More >>
The author discusses quantum algorithms for solving the Integer Factorization Problem (IFP), the Discrete Logarithm... Read More >>
Taking an transformative approach to peace of mind in today's telecom systems, the third aspect talks about general... Read More >>
The papers are organized in topical sections on wireless communications and networking, satellite and space communications... Read More >>
Stylish Designer Journal / Notebook. Interior 150 lined pages. Size 6 x 9 . Glossy softcover. Perfect for everyday... Read More >>
This book constitutes revised selected papers from the 20th International Conference on Information Security and... Read More >>
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference... Read More >>
This book explains the fundamental concepts of information theory, so as to help students better understand modern... Read More >>
BlockchainHow Bitcoin and Blockchain Are Reshaping the World of FinanceHave you heard the term blockchain get thrown... Read More >>
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2018, CT-RSA 2018,... Read More >>
This handbook provides a complete reference on elliptic and hyperelliptic curve cryptography. Addressing every aspect... Read More >>
Read More >>
The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference... Read More >>
Basic and advanced techniques are discussed aimed to modulate information into images, texts and barcodes.Conveying... Read More >>
This book constitutes the refereed post-conference proceedings of the First International Conference on Number-Theoretic... Read More >>
Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations... Read More >>
This book constitutes the revised selected papers from the 12th International Conference on Risk and Security of... Read More >>