Free Delivery Over $100
3712 books were found.
Espionage (colloquially, spying) is the obtaining of secret orconfidential information without the permission of... Read More >>
Offensive cyber counterintelligence concepts, methods, and implications in a post-Edward Snowden world Read More >>
Specifically, it introduces the tools of the AVS2 standard, describing how AVS2 can help to achieve a significant... Read More >>
Read More >>
In this book the authors first describe the background of trusted platforms and trusted computing and speculate... Read More >>
The need for information privacy and security continues to grow and gets increasingly recognized. In this regard,... Read More >>
Cryptography is the essential and efficient ingredient to the recipe of security solutions. With the arrival of... Read More >>
Brings together new ideas on how to deal with potential leaks of valuable customer information. Highlighting the... Read More >>
Applications to several important network models, including random Boolean networks, suggest that the capability... Read More >>
This book contains extended and revised versions of the best papers that were p- sented during the 16th edition... Read More >>
Constitutes the refereed proceedings of the IFIP TC 8 International Conference on E-Government and E-Services, EGES... Read More >>
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC... Read More >>
Presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security,... Read More >>
The papers have been organized in topical sections on Boolean functions, perfect sequences, correlation of arrays,... Read More >>
The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital... Read More >>
In this new edition of this classic text, much of the material has been rearranged and revised for pedagogical reasons.... Read More >>
New Directions in Wireless Communications Research addresses critical issues in the design and performance analysis... Read More >>
This book constitutes the proceedings of the First International Conference on Security Standardisation Research,... Read More >>
Such applications include the randomness of finite objects or infinite sequences, Martin-Loef tests for randomness,... Read More >>
The fascinating theory of error-correcting codes is a rather new addition to the list of mathematical disciplines.... Read More >>
Certification and Security in Inter-Organizational E-Services presents the proceedings of CSES 2004 - the 2nd International... Read More >>
This book is the first comprehensive overview of contemporary systems for secure electronic/digital postage. It... Read More >>
Information Processing and Security Systems is a collection of forty papers that were originally presented at an... Read More >>
A new starting-point and a new method are requisite, to insure a complete [classi?cation of the Steiner triple systems... Read More >>