Free Delivery Over $100
4195 books were found.
Read More >>
The goals for this international working conference are to find answers to the following questions: • what precisely... Read More >>
This book shows security engineers how to configure, deploy, and troubleshoot the preferred tools of the trade.... Read More >>
Annually sponsored by the Korea Institute of Information Security and Crypt- ogy (KIISC), the fourth International... Read More >>
In the end, the elegance, efficiency, security, and principled design of Rijndael won the day for its two Belgian... Read More >>
Ubiquitous computing is about distributed systems with a difference. It is about hundreds and thousands of computers... Read More >>
A collection of compression information and algorithmic tools. Read More >>
This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers’... Read More >>
This title enables readers to master penetration testing: hack your own systems to discover and fix their vulnerabilities.... Read More >>
This text is a clearly-written guide to building secure distributed applications with CORBA. It helps securing CORBA... Read More >>
A collection of 26 papers selected from 69 submissions plus one invited talk. Among the topics addressed are encryption... Read More >>
The ""secret science"" of cryptology has become important for protecting communication channels, databases and software.... Read More >>
A guide to Windows 2000 security. This work contains topics like: physical and file system security; password security;... Read More >>
Containing the post-proceedings of the 8th International Workshop on Selected Areas in Cryptology held in Toronto... Read More >>
These start with mathematical bounds, statistical decoding schemes for error correcting codes, and undetected error... Read More >>
The Program Committee considered 77 papers and selected 31 papers for presentation. We wish to thank the Program... Read More >>