Free Delivery Over $100
4195 books were found.
Read More >>
* Computer professionals need to protect the information and networks that are vital to their organization. * This... Read More >>
<p>This book explores the economic, behavioral and legal factors that drive information security risks and solutions.... Read More >>
<p>This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer... Read More >>
Presents an overview of Distributed Systems security concerns, challenges, processes and solutions. Discusses threats... Read More >>
Computer Security Handbook, Fifth Edition provides comprehensive coverage of the broad scope of issues relating... Read More >>
Constitutes the refereed proceedings of the Second Western European Workshop on Research in Cryptology, WEWoRC 2007,... Read More >>
<p>This book constitutes the thoroughly refereed proceedings of the 10th International Workshop on Principles, Systems... Read More >>
Constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008,... Read More >>
<p>This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security,... Read More >>
Examines information security management for the facilitation of picture archiving and communication systems. Read More >>
This text covers basic techniques from algebra and number theory which have recently proven to be extremely useful... Read More >>
The NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting... Read More >>
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques.... Read More >>
This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou,... Read More >>
This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS... Read More >>
Intended for a graduate-level course in Cryptographic Engineering, this text will teach students with a basic knowledge... Read More >>
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS... Read More >>
It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability... Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT... Read More >>
Offers developers and testers the tools they need to make security testing a regular part of their development lifecycle.... Read More >>
Constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto... Read More >>