Free Delivery Over $100
4195 books were found.
Constitutes the refereed proceedings of the IFIP TC 8 International Conference on E-Government and E-Services, EGES... Read More >>
Constitutes the refereed proceedings of the 6th International Conference, ICGS3, that was held in Braga, Portugal,... Read More >>
Read More >>
This accessible book examines the physical security of computer hardware, networks, and digital data, introduces... Read More >>
This book presents the challenges of designing hierarchical cryptographic key management algorithms to implement... Read More >>
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together.... Read More >>
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and... Read More >>
An introduction that provides a focused tour of the central concepts of cryptography. It delineates cryptographic... Read More >>
Clarifies the theory and techniques of cryptography and illustrates how to establish and maintain security under... Read More >>
This book constitutes the proceedings of the First International Conference on Cryptology and Information Security... Read More >>
Constitutes the refereed proceedings of the 30th Annual International Cryptology Conference, CRYPTO 2010, held in... Read More >>
Explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding.... Read More >>
<p>This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing... Read More >>
Constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September... Read More >>
Constitutes the proceedings of the 4th International Workshop on Critical Information Infrastructures Security,... Read More >>
ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea,... Read More >>
The papers handle topics such as access control, privacy of web based search, anonymus webs of trust, security attacks,... Read More >>
Constitutes the refereed proceedings of the 7th International Conference on Detection of Intrusions and Malware,... Read More >>
Constitutes the refereed proceedings of the 9th International Algorithmic Number Theory Symposium, ANTS 2010, held... Read More >>
Constitutes the refereed post-conference proceedings of the 14th International Conference on Financial Cryptography... Read More >>
It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services... Read More >>
Instructions on proactively ensuring the safety and security of Oracle data are found in this innovative guide to... Read More >>
Constitutes the proceedings of the 17th International Workshop on Fast Software Encryption, held in Seoul, Korea,... Read More >>
Constitutes the refereed post conference proceedings of the 5th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International... Read More >>