Free Delivery Over $100
4195 books were found.
Read More >>
The essential tool for understanding and deploying enterprise PKIs. Read More >>
The second volume includes 28 papers organized in topical sections on peer-to-peer, pricing, resource allocation,... Read More >>
The first volume includes 36 papers and is organized in topical sections on anomaly detection, content management,... Read More >>
The papers are organized in topical sections on lattice-base cryptography, implementation and side channels, homomorphic... Read More >>
They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data... Read More >>
This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union’s... Read More >>
The symposium provides a forum forresearchers, educators, engineers, and government officials to presentand discuss... Read More >>
Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers,... Read More >>
Every day, organizations large and small fall victim to attacks on their data. Encryption provides a shield to help... Read More >>
Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past... Read More >>
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for... Read More >>
Students who are beginning studies in technology need a strong foundation in the basics before moving on to more... Read More >>
This book constitutes the refereed proceedings of the 6th InternationalJoint Conference on e-Business and Telecommunications,... Read More >>
The papers are organized in topical sections on hardness amplification, leakage resilience, tamper resilience, encryption,... Read More >>
Deals with the invertibility theory of finite automata and its application to cryptography. This title discusses... Read More >>
Constitutes the refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust,... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected... Read More >>
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory... Read More >>
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International... Read More >>
This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec... Read More >>
Provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. In this book,... Read More >>
Multibiometric systems are expected to meet the stringent performance requirements imposed by large-scale authentication... Read More >>
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal... Read More >>
This book constitutes the refereed proceedings of the Third International Symposium on Engineering Secure Software... Read More >>