Free Delivery Over $100
4195 books were found.
RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security... Read More >>
This professional book covers almost all known cryptanalytic attacks and defenses of the RSA cryptographic system... Read More >>
Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security... Read More >>
This book constitutes the refereed proceedings of the 6th International Workshop Radio Frequency Identification:... Read More >>
Biometrics is a rapidly evolving field with applications ranging from accessing one’s computer to gaining entry... Read More >>
Open Source Systems Security Certification discusses Security Certification Standards and establishes the need to... Read More >>
Intended for a graduate-level course in Cryptographic Engineering, this text will teach students with a basic knowledge... Read More >>
Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray... Read More >>
"An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The... Read More >>
Online Business Security Systems applies the concept of synchronization to security of global heterogeneous and... Read More >>
Presents some of the important research trends reflected in advances in computer security, including: security protocol... Read More >>
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations... Read More >>
Identity technologies are problematic, and many see light at the end of the identity theft tunnel. The light is... Read More >>
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions.... Read More >>
In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations... Read More >>
Presents information on the use of several algebraic techniques in analyzing the AES. This book is useful for academic... Read More >>
This year IWSEC 2010 had three tracks, the Foundations of Security (Track I), Security in Networks and Ubiquitous... Read More >>
Power analysis attacks allow the extraction of secret information from smart cards. In all these applications, the... Read More >>
Covers a majority of the subjects that make up cryptology, including symmetric or public-key cryptography, cryptographic... Read More >>
Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing... Read More >>
Read More >>
It raised my interest, and after reading some early research papers on the topic, I thought: “There must exist better... Read More >>
This book presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence... Read More >>
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009),... Read More >>