Free Delivery Over $100
4195 books were found.
Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting... Read More >>
Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses... Read More >>
The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties... Read More >>
This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. It reviews a series of methods... Read More >>
Privacy preserving data mining implies the ""mining"" of knowledge from distributed data without violating the privacy... Read More >>
This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc... Read More >>
This book proposes a number of techniques to perform data mining tasks in a privacy-preserving way. The survey information... Read More >>
Decisions on the limits of privacy intrusions – or privacy protection, for that matter – are ultimately political... Read More >>
Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security... Read More >>
ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference... Read More >>
Securing complex and networked systems has become increasingly important as these systems play an indispensable... Read More >>
Read More >>
<p>Every day organizations large and small fall victim to attacks on their data. Encryption provides a shield to... Read More >>
Though network security has almost always been about encryption and decryption, the field of network security is... Read More >>
Get complete coverage of all the objectives included on CompTIA Security+ exam inside this completely updated, comprehensive... Read More >>
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With... Read More >>
Biometric System and Data Analysis: Design, Evaluation, and Data Mining brings together aspects of statistics and... Read More >>
Along with the traditional security aspects of data integrity and availability, there is an increasing interest... Read More >>
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest... Read More >>
Biometrics is becoming increasingly common in establishments that require high security such as state security and... Read More >>
Describes the advances in securing group communications. This book focuses on tailoring the security solution to... Read More >>