Free Delivery Over $100
3712 books were found.
A clear, actionable blueprint for securing the vital information and IT services of global organizations of all... Read More >>
Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries in... Read More >>
Read More >>
This new exam guide for the all-new Certified Cyber Forensics Professional certification from (ISC)2 covers all... Read More >>
This proceedings is a representation of decades of reasearch, teaching and application in the field. Image Processing,... Read More >>
The work introduces the fundamentals concerning the measure of discrete information, the modeling of discrete sources... Read More >>
The video coding standard High Efficiency Video Coding (HEVC) targets at improved compression performance for video... Read More >>
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring... Read More >>
Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past... Read More >>
This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security,... Read More >>
This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied... Read More >>
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases,... Read More >>
This book constitutes the proceedings of the 8th International Workshop on Reachability Problems, RP 2014, held... Read More >>
This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded... Read More >>
This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014,... Read More >>
This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management,... Read More >>
This fully updated new edition of the classic work on information theory presents a detailed analysis of Shannon-source... Read More >>
Starting with early prototypes and proposed applications, this book surveys the longer history of amplifying small... Read More >>
Filled with cutting-edge social engineering testing techniques that are legally and ethically sound, this book fully... Read More >>
Written by two healthcare information security and privacy experts, this definitive resource fully addresses security... Read More >>