Free Delivery Over $100
4195 books were found.
A collection of 10 papers presented together with an introductory survey and 4 invited papers by researchers that... Read More >>
As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand... Read More >>
One aspect of homeland security issues with wide-ranging implications is information security. This book presents... Read More >>
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR... Read More >>
Read More >>
Information Processing and Security Systems is a collection of forty papers that were originally presented at an... Read More >>
A collection of papers that address several aspects of fast primitives for symmetric cryptology, including the design,... Read More >>
Constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP... Read More >>
With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform... Read More >>
Written by an authour who has great deal of experience in real-world security design and implementation. Read More >>
Presents a Defense in Depth model for protecting various Windows networks. This book addresses the three elements... Read More >>
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals... Read More >>
Computer security in the business environment can often seem a quagmire in which constantly changing hardware, networks... Read More >>
Constitutes the refereed postproceedings of the 7th International Conference on Information Security and Cryptology,... Read More >>
This volume contains the refereed proceedings of the 3rd International Conf- ence on Sequences and Their Applications... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Privacy Enhancing... Read More >>
Delivering an accurate introduction to the modern cryptography, this book offers an understanding of essential tools... Read More >>
The first to provide an in-depth coverage of the issues surrounding secure databases and applications, this book... Read More >>
With this easy-to-use guide, professional programmers and testers will learn how to recognize and prevent these... Read More >>
This study of the VB.NET programming language through hacks and pranks relates to all contemporary versions of the... Read More >>
Deals with the topic of database security and auditing. This book covers diverse topics that include different aspects... Read More >>
Presents a selection of the papers presented at the NATO Advanced Research Workshop dealing with the Subject of... Read More >>
Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security,... Read More >>
Cyberspace security is a critical subject of our times. This book is a selection of the best papers presented at... Read More >>
Provides an overview of the Check Point's certification exam, 156-210.4. Written by an experienced and CCSA, CCSE... Read More >>