Free Delivery Over $100
4195 books were found.
Offers students and researchers with mechanical information regarding digital watermarking and steganography. This... Read More >>
Covers management issues facing IT and security professionals. Compiled from the best of the Syngress and Butterworth... Read More >>
"In today's super-connected computing world, your PC enjoys a richer diversity of applications, multimedia, and... Read More >>
Read More >>
Constitutes the refereed post-proceedings of the 14th International Workshop on Selected Areas in Cryptography,... Read More >>
Constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in... Read More >>
Employees know a company's computer system better than anyone and have access to important information about the... Read More >>
Neal Koblitz is a co-inventor of one of the two most popular forms of encryption and digital signature, and his... Read More >>
Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. Read More >>
Along with the traditional security aspects of data integrity and availability, there is an increasing interest... Read More >>
Constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security,... Read More >>
Constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS... Read More >>
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field,... Read More >>
This professional book covers almost all known cryptanalytic attacks and defenses of the RSA cryptographic system... Read More >>
Containing information on steganalysis and steganography, this book includes watermarking with side information,... Read More >>
Constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007,... Read More >>
Constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology,... Read More >>
After 11 weeks of reviewing, the Program Committee selected 33 papers for presentation (two papers were merged).... Read More >>
Find out how to use the fortress built into Vista Assess your risk, protect your kids, and keep phishers out of... Read More >>
Constitutes the refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies,... Read More >>
This book consists of a collection of works on utilizing the automatic identification technology provided by Radio... Read More >>