Free Delivery Over $100
4195 books were found.
Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of... Read More >>
Ad-hoc networks are dynamic collections of self-organizing mobile wireless nodes with links that are changing in... Read More >>
Fighting new threats with an old weapon As an instructor at the University of Tulsa, Christopher Swenson could... Read More >>
Maps the exam objectives for the Security Certified Network Professional (SCNP) exam. Designed to help students... Read More >>
Read More >>
Compiles authoritative research on fundamental encryption algorithms and systems supported in information technology... Read More >>
This book constitutes the refereed proceedings of the Fifth Theory of Cryptography Conference, TCC 2008. It covers... Read More >>
This book contains the proceedings of the 11th International Workshop on Practice and Theory in Public-Key Cryptography.... Read More >>
Taking account of the legislative changes, this title offers guidance and workable policies and solutions to issues... Read More >>
Assesses the state of play with respect to customer and business concerns for personal data and the response of... Read More >>
Cyber Security and Quality of Service: Modelling and Analysis for Systems Dependability presents a wide range of... Read More >>
Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting... Read More >>
We are glad to present in this volume the proceedings of the ninth edition of Information Hiding (IH 2007). We would... Read More >>
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during... Read More >>
SOA is one of the latest technologies enterprises are using to tame their software costs--in development, deployment,... Read More >>
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and... Read More >>
This book provides a broad overview of the many card systems and solutions in practical use today. It combines a... Read More >>
Ziel der Autoren ist es, bei Entwicklern und Projektleitern ein grundlegendes Sicherheitsbewusstsein zu schaffen... Read More >>
Uses real-life situational examples to describe the legal and ethical issues surrounding plagiarism and the tools... Read More >>
Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas... Read More >>
Fuzzing is often described as a 'black box' software testing technique. It works by automatically feeding a program... Read More >>
Offers information needed to track, monitor, investigate, document, and preserve both authorized and unauthorized... Read More >>
The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http://fc07. The conference... Read More >>