Free Delivery Over $100
4195 books were found.
Provides an introduction to the realm of network security. This book addresses how and why people attack computers... Read More >>
Deals with computer security technology that operates in rapidly changing environments. This book contains a proposal... Read More >>
Offers an accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions,... Read More >>
Presents revised versions of eight tutorial lectures given by leading researchers during two International Schools... Read More >>
Describes the theoretical frameworks, research findings, and practical applications of digital audio watermarking... Read More >>
Constitutes the refereed proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems,... Read More >>
Constitutes the refereed post-proceedings of the 14th International Workshop on Fast Software Encryption, FSE 2007,... Read More >>
Information Security is achieved through a mix of technical, organizational and legal measures. This book includes:... Read More >>
Constitutes the refereed proceedings of the 27th Annual International Cryptology Conference, CRYPTO 2007, held in... Read More >>
Identity technologies are problematic, and many see light at the end of the identity theft tunnel. The light is... Read More >>
Constitutes the proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection, RAID... Read More >>
Since 2004, built-in security measures on compilers and operating systems have become commonplace. The black hats... Read More >>
This book first offers a baseline in identity, including coverage of identity concepts, the laws of identity, and... Read More >>
The second edition of this successful book shows how the contents of computer systems can be recovered for criminal... Read More >>
Presents a comprehensive and multidisciplinary examination of privacy in the information age. This book focuses... Read More >>
The IPSec may be used in three different security - mains: Virtual private networks, Application-level security,... Read More >>
"""IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job""." Read More >>
Online Business Security Systems applies the concept of synchronization to security of global heterogeneous and... Read More >>
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals... Read More >>
Constitutes the refereed proceedings of the 4th International Conference on Detection of Intrusions and Malware,... Read More >>
The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than... Read More >>
Read More >>
International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the... Read More >>
This volume contains the papers presented at the 21st Annual IFIP WG 11.3 Conference on Data and Applications Security... Read More >>