Free Delivery Over $100
4195 books were found.
Digital watermarking is one of the widely used techniques used in the world in the area of information security.This... Read More >>
Helps learners master the skills necessary to launch and complete a successful computer investigation. This resource... Read More >>
<p>This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference... Read More >>
MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems.... Read More >>
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 12th International Symposium... Read More >>
This book constitutes the proceedings of the International Conference on Personal Satellite Services (PSATS 2009)... Read More >>
Constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held... Read More >>
During the last few years it has been held in Toronto, Canada (2002), Montreal, Canada (2003), Vancouver, Canada... Read More >>
The Joint Workshop on ""Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security""... Read More >>
The book in front of you contains the proceedings of SAC 2008, the 15th - nual Workshop on Selected Areas in Cryptography.... Read More >>
Intended for anyone from the mobile user to a student or professional working in a wireless environment, this title... Read More >>
The papers in this s- tion deal with provenance access control, access control model for collaborative editors,... Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on Next Generation Teletraffic... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference,... Read More >>
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability... Read More >>
The review process followed strict standards: each paper - ceived at least four reviews, and some asmanyaseightreviews.Membersofthe... Read More >>
These proceedings contain the papers presented at VoteID 2009, the Second - ternationalConferenceonE-votingandIdentity.TheconferencewasheldinL-... Read More >>
Constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held... Read More >>
<p>Information security and copyright protection are more important today than before. Digital watermarking is one... Read More >>
This book is one of the first to cover SAT-solvers and how they can be used in cryptanalysis. It includes chapters... Read More >>
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital... Read More >>
This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying... Read More >>
This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September... Read More >>
Covers the proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007.... Read More >>
<p>The Safety and Security in Multiagent Systems (SASEMAS) series of workshops that took place from 2004-2006 provided... Read More >>