Free Delivery Over $100
4195 books were found.
Computing systems including hardware, software, communication, and networks are becoming increasingly large and... Read More >>
Several years later, IBM responded with a system called Lucifer that came to simply be known as DES (data encryption... Read More >>
'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages... Read More >>
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October... Read More >>
Read More >>
Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration... Read More >>
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline... Read More >>
Constitutes the proceedings of the 5th International Symposium on Trustworthy Global Computing, TGC 2010, held in... Read More >>
Explains lockpicking to quick-entry techniques like shimming, bumping, and bypassing. This title is suitable for... Read More >>
In computer science, the initial mo- vation was also respondent privacy but, from 2000 onwards, growing attention... Read More >>
This is a mathematical treatment of combinatorial encryption techniques used in digital content distribution systems... Read More >>
Novel multiple access techniques like code division multiple access (CDMA) and orthogonal frequency division multiple... Read More >>
ICITS2009washeldattheShizuokaConventionandArtsCenter“GRANSHIP” in Japan during December 3–6,2009.This was the 4th... Read More >>
It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf-... Read More >>
Constitutes the proceedings of the 6th International Conference on Sequences and Their Applications held in Paris,... Read More >>
The VLDB Secure Data Management Workshop was held for the 7th time this year. The topic of data security remains... Read More >>
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was... Read More >>
Constitutes the proceedings of the 15th European Symposium on Computer Security held in Athens, Greece in September... Read More >>
Applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect... Read More >>
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence... Read More >>