Free Delivery Over $100
4195 books were found.
The areas of cryptography, automata and learning theory have strong theoretical foundations with more practical... Read More >>
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011,... Read More >>
A book that constitutes the proceedings of the 7th VLDB Workshop on Secure Data Management that was held in Singapore... Read More >>
Constitutes the refereed post-workshop proceedings of the 5th International Workshop on Formal Aspects in Security... Read More >>
Read More >>
Constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held... Read More >>
<p>This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital... Read More >>
Learn how to build a Security Incident Response team with guidance from a leading SIRT from Cisco. With this handbook,... Read More >>
Constitutes the refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust,... Read More >>
This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications,... Read More >>
Speech Dereverberation presents a mathematical formulation of the problem and the state-of-the-art solutions for... Read More >>
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols,... Read More >>
Deals with the national debate on protecting critical infrastructure. This book covers cyber security policy development... Read More >>
With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was... Read More >>
With the significant advances in the last decade, the concept of ad hoc networks now covers an even broader scope,... Read More >>
Constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security,... Read More >>
International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
Presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques. This book also... Read More >>