Free Delivery Over $100
4195 books were found.
Features proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity,... Read More >>
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS... Read More >>
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field,... Read More >>
The IPSec may be used in three different security - mains: Virtual private networks, Application-level security,... Read More >>
This book deals with algorithmic problems concerning binary quadratic forms 2 2 f(X,Y)= aX +bXY +cY with integer... Read More >>
Conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned... Read More >>
An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway... Read More >>
Data warehousing and data mining provide techniques for collecting information from distributed databases and for... Read More >>
This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC... Read More >>
In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems... Read More >>
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional... Read More >>
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers... Read More >>
The protocols include:- Secure address resolution - Weak hop integrity - Strong hop integrity using soft sequence... Read More >>
Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. Read More >>
Discusses wireless security issues from physical layer to application layer. This book identifies important vulnerabilities... Read More >>
Company network administrators are compelled today to aggressively pursue a robust network security regime. This... Read More >>
Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years,... Read More >>
In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating... Read More >>
Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e.,... Read More >>
Read More >>
Welcome to the proceedings of the 2010 International Conference on Future Gene- tion Communication and Networking... Read More >>
Constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing... Read More >>
P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible... Read More >>
This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume... Read More >>
This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIPISEC... Read More >>