Free Delivery Over $100
4195 books were found.
Constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and... Read More >>
Offering practical advice along with templates, checklists, and directions to public domain information, this book... Read More >>
Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based... Read More >>
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying... Read More >>
Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application... Read More >>
Constitutes the thoroughly refereed post-conference proceedings of the 7th International Joint Conference on e-Business... Read More >>
There is a need within radio-frequency identification (RFID) and other smart technologies to understand related... Read More >>
Digitale Fernseh- und Horfunktechnik in Theorie und Praxis ist eine deutlich erweiterte zweite Auflage von Walter... Read More >>
Constitutes the papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007,... Read More >>
This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure... Read More >>
Examines past research that outlines the requirements for a secure operating system and research that implements... Read More >>
th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH... Read More >>
These are the proceedings of IPTComm 2008 – the Second Conference on Pr- ciples,Systems andApplications ofIP Telecommunications–heldinHeidelberg,... Read More >>
Based on the paradigm of model-driven security, the authors of this book show how to systematically design and realize... Read More >>
This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications... Read More >>
The papers cover topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key... Read More >>
Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008)... Read More >>
A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest... Read More >>