Free Delivery Over $100
4195 books were found.
You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad... Read More >>
These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007),... Read More >>
Proceedings of SPIE offer access to the latest innovations in research and technology and are among the most cited... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
User identification and authentication are essential to modern security. This book presents the general philosophy... Read More >>
Read More >>
Radiation Effects on Embedded Systems aims at providing the reader with the major guidelines for coping with radiation... Read More >>
This is the first and only publication describing new methods for creating better security technologies, direct... Read More >>
Offers an explanation of information security, physical security, and why approaching these two different types... Read More >>
Contains information on a wide variety of topics related to Techno Security. This book takes the approach of identifying... Read More >>
Presents a comprehensive reference source on ethical and security issues relating to technologies. This title includes... Read More >>
Provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations... Read More >>
Provides a working knowledge of the major security issues affecting enterprise IT activities. This book examines... Read More >>
This book provides an introduction to applied cryptanalysis, that is, cryptanalysis that actually breaks ciphers... Read More >>
Decisions on the limits of privacy intrusions – or privacy protection, for that matter – are ultimately political... Read More >>
Covers real, tactical wireless security implementation. This title shows how to execute the attacks and implement... Read More >>
Provides a compilation of the fundamental knowledge, skills, techniques, and tools required of IT security professional.... Read More >>
This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC... Read More >>
Constitutes refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic... Read More >>
Systems Security Certified Practitioner Certification is the key to unlocking the upper ranks of security implementation... Read More >>
The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC)... Read More >>
The third international conference on Information Security Practice and - perience (ISPEC 2007) was held in Hong... Read More >>
Addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed... Read More >>