Free Delivery Over $100
4195 books were found.
These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer... Read More >>
Shows you how to design a secure multimedia encryption scheme. This title begins with the history of multimedia... Read More >>
Read More >>
Constitutes the proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island,... Read More >>
It is a pleasure to welcome you to the proceedings of the second International Castle Meeting on Coding Theory and... Read More >>
Offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards,... Read More >>
Increasing amounts of digital image, video, and music have created many information security issues, this work examines... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for... Read More >>
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Smart Card Research and Advanced... Read More >>
<p>This book constitutes the refereed proceedings of the 7th Annual Mediterranean Ad Hoc Networking Workshop held... Read More >>
This book contains the proceedings of the 5th International Conference on Trust, Privacy and Security in Digital... Read More >>
These emerging technologies put new requirements on security and data m- agement. Therefore, research in secure... Read More >>
<p>From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts... Read More >>
Provides comprehensive treatment of the major areas of computer security, aiming to give readers a foundation in... Read More >>
IDA Pro is the de facto standard for the analysis of hostile code and vulnerability research, and the tool that... Read More >>
""Data Security Breaches: Context & Incident Summaries"". Read More >>
Provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize... Read More >>
This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008,... Read More >>
The 16 revised full papers and 9 revised short papers presented together with 5 poster papers, 2 panel reports,... Read More >>
<p>The explosive popularity of the Internet as a business tool has created a new type of economy, which is called... Read More >>
<p>Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd... Read More >>
Provides an essential reference for anyone interested in the effective management of semsistructured data. This... Read More >>
Presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques. This book also... Read More >>
<p>Communications and Multimedia Security is an essential reference for both academic and professional researchers... Read More >>