Free Delivery Over $100
4195 books were found.
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
Read More >>
This is one of two books in the DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES, designed to fortify disaster recovery... Read More >>
""Volume 1 of 2 mapping to ECDR [and] ECVT certification""--Cover. Read More >>
Constitutes the refereed proceedings of the Third International Workshop on the Arithmetic of Finite Fields, WAIFI... Read More >>
Constitutes the refereed proceedings of the 16th EUNICE/IFIP TC 6.6 Workshop on Networked Services and Applications,... Read More >>
This self-contained 2006 text introduces the principles and techniques of quantum cryptography, with specific focus... Read More >>
This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications... Read More >>
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the... Read More >>
Constitutes the refereed proceedings of the 4th International Conference on Information Security and Assurance,... Read More >>
The different attributes of dependability and security cannot be considered in isolation for today’s critical systems,... Read More >>
ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past... Read More >>
This volume contains the proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST),... Read More >>
Constitutes the refereed proceedings of the 15th Australasian Conference on Information Security and Privacy, ACISP... Read More >>
Constitutes the proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2010, held in... Read More >>
These cover various topics such as Satellite Communications: Coding and Modulations, Multimedia Integration, Satellite... Read More >>
As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I... Read More >>
"""This book introduces readers to state-of-art research in multimedia watermarking in the different disciplines... Read More >>
Offers a succinct in-depth review and tutorial of a subject that promises to lead to major advances in computer... Read More >>
Constitutes the refereed proceedings of the 4th IFIP WG 11.11 International Conference, IFIPTM 2010, held in Morioka,... Read More >>
Constitutes the refereed proceedings of the Third International Workshop on Post-Quantum Cryptography, PQCrypto... Read More >>
This will not only e?ect companies, who will be able to optimize their production and delivery processes, but also... Read More >>
Constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography,... Read More >>