Free Delivery Over $100
4195 books were found.
Read More >>
Covers: basic concepts; hackers, crackers, and phreaks; objects of analysis: text strings, source code, machine... Read More >>
Watermarking techniques involve the concealment of information within a text or images and the transmission of this... Read More >>
"Part of the ""HP Professional Books"" series, this book aims to provide HP-UX sysadmin, programmer, and performance... Read More >>
The lectures are devoted to:- Formal Approaches to Approximating Noninterference Properties - The Key Establishment... Read More >>
A broad overview and exposition of one of the most widely used cryptosystems in wireless devices and smartcards... Read More >>
Introduces various algorithms for primality testing and integer factorization, with their applications in public-key... Read More >>
Includes the tools and features exam candidates want most, including in-depth, self-paced training based on exam... Read More >>
Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Formal Aspects... Read More >>
Sharing secrets for the effective creation of auditing mechanisms for Health/Insurance Portability and Accountability... Read More >>
Presents a range of computational algorithms for fingerprint recognition. These include feature extraction, indexing,... Read More >>
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies... Read More >>