Free Delivery Over $100
4195 books were found.
Constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology,... Read More >>
Read More >>
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized... Read More >>
The 27th Annual International Cryptology Conference was held in Santa Barbara, California, in August 2007. The conference... Read More >>
The Most Progressive and Complete Guide to DDO-Based CiphersDevelopers have long recognized that ciphers based on... Read More >>
In his role managing the content for a site and a weekly newsletter, the author has learned how to talk to people... Read More >>
An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection... Read More >>
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional... Read More >>
This follow--on edition to The CISSP Prep Guide: Mastering CISSP and ISSEP offers value--add coverage not featured... Read More >>
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions.... Read More >>
This insider’s guide examines computer security from the hacker's perspective, demonstrating how a security system... Read More >>
Explores organized crime, terrorist threats, and hackers. This work addresses the steps organizations must take... Read More >>
Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e.,... Read More >>
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security.... Read More >>
"Discusses about keeping safe-protecting your data, your identity, and yourself without giving up all the great... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
Shows how to maximize the security features in Oracle E-Business Suite, Oracle's fully integrated, suite of enterprise... Read More >>
As our computers continue to get infested by all sorts of malware, and as our networks continue to choke with spam... Read More >>
ISEC is a te- nical group on information security of the Institute of Electronics, Information and Communication... Read More >>
Cryptology, for millennia a ""secret science"", is rapidly gaining in practical importance for the protection of... Read More >>