Free Delivery Over $100
4597 books were found.
Covers a majority of the subjects that make up cryptology, including symmetric or public-key cryptography, cryptographic... Read More >>
Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing... Read More >>
Read More >>
This year IWSEC 2010 had three tracks, the Foundations of Security (Track I), Security in Networks and Ubiquitous... Read More >>
It raised my interest, and after reading some early research papers on the topic, I thought: “There must exist better... Read More >>
This book presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence... Read More >>
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009),... Read More >>
Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications... Read More >>
This book is intended as a text for a course on cryptography with emphasis on algebraic methods. A novel feature... Read More >>
Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Starting... Read More >>
It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share... Read More >>
IBWAS 2009, the Iberic Conference on Web Applications Security, was the first international conference organized... Read More >>
Radiation Effects on Embedded Systems aims at providing the reader with the major guidelines for coping with radiation... Read More >>
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying... Read More >>
Gröbner bases have emerged as the main tool in computational algebra, permitting numerous applications, both in... Read More >>
One of the challenges for computational intelligence and biometrics is to understand how people process and recognize... Read More >>
Smart Cards, Tokens, Security and Applications provides a broad overview of the many card systems and solutions... Read More >>
Details the important techniques used to make the storage and transmission of data fast, secure, and reliable. This... Read More >>
Together with a brief introduction into grid computing in general and underlying security technologies, this book... Read More >>
A rated survey list of available systems and tools completes the book.With this broad overview, the authors address... Read More >>