Free Delivery Over $100
4195 books were found.
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat... Read More >>
Part of the Exam Certification Guide Series , this work serves as a preparation guide for the Cisco SNRS exam 642-502.... Read More >>
Read More >>
The boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data,... Read More >>
Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held... Read More >>
It was a pleasure to take part in the 2005 European Workshop on Security and Privacy in Ad Hoc and Sensor Networks... Read More >>
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this... Read More >>
Constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS... Read More >>
Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in... Read More >>
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory... Read More >>
Constitutes the refereed proceedings of the annual International Conference on Computational Intelligence and Security,... Read More >>
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established... Read More >>
Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997... Read More >>
Presents a collection of articles that grew out of an expository and tutorial conference on public-key cryptography... Read More >>
Face recognition has been actively studied over years. This work provides a comprehensive review of this biometric,... Read More >>
Privacy preserving data mining implies the ""mining"" of knowledge from distributed data without violating the privacy... Read More >>
Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers... Read More >>