Free Delivery Over $100
4195 books were found.
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference... Read More >>
Covers the proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in December 2007.... Read More >>
The plenary session on Digital Forensics Practice included Troy O’Malley, Que- sland Police Service, who outlined... Read More >>
Read More >>
This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT... Read More >>
<p>This book constitutes the refereed proceedings of the 23nd Annual IFIP WG 11.3 Working Conference on Data and... Read More >>
An anthology that describes methods used to secure computer systems in the face of threats. It covers topics that... Read More >>
Examines the field of information security to prepare information systems students for their future roles as business... Read More >>
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009,... Read More >>
Constitutes the refereed proceedings of the 8th International Symposium on Experimental and Efficient Algorithms,... Read More >>
<p>This book constitutes the refereed proceedings of the Third International Conference on Advances in Information... Read More >>
<p>This book constitutes the refereed proceedings of the 6th International Conference on Detection of Intrusions... Read More >>
Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held... Read More >>
Constitutes the refereed proceedings of the Future Multimedia Networking Workshop, FMN 2010, held in Krakow, Poland,... Read More >>
Because of this success, we launched a call for papers dedicated to computer security from it’s foundation to practice,... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network... Read More >>
This book constitutes the refereed proceedings of the 18th International... Read More >>
This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC... Read More >>
A general description of how Actual Matrix Encryption works. There is enough information presented so that a programmer... Read More >>
Cet ouvrage (2e edition actualisee et augmentee) presente les fondements theoriques de la virologie informatique,... Read More >>
Constitutes the refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications,... Read More >>
This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications... Read More >>