Free Delivery Over $100
4195 books were found.
Conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned... Read More >>
These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme... Read More >>
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean... Read More >>
Your expert guide to information security As businesses and consumers become more dependent on complex multinational... Read More >>
We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). IWDW... Read More >>
Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical... Read More >>
Constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM... Read More >>
Aimed at medical transcription students and professionals, this book covers legal issues surrounding the HIPAA Privacy... Read More >>
Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems,... Read More >>
Explains how to defend against vulnerabilities in systems and underlying network infrastructure. This book features... Read More >>
Intended for those working in the field of cyber-security, this book helps the readers understand the growing threat... Read More >>
Read More >>
Provides easy access to information on various aspects of cryptography and security. This work covers subject areas... Read More >>
This study investigates the impacts and risk assessment of technology-ena bled information (TET), v^hich are engaged... Read More >>
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical... Read More >>
Constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held... Read More >>
Includes a coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.... Read More >>
The author provides the economic, policy, and physics background to the issues of infrastructure security, along... Read More >>
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical... Read More >>
The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth... Read More >>
A guide to effective security for both voice and data wireless networks. It offers the conceptual and practical... Read More >>