Free Delivery Over $100
4215 books were found.
The program committee considered 68 submissions of which 21 papers were accepted. Many thanks to George Davida,... Read More >>
"Reviewing the threats to Windows PC such as what hackers know about your computer and the Internet, and how they... Read More >>
Read More >>
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in... Read More >>
The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented... Read More >>
This volume on computer network security and cyber ethics examines topics including: the infrastructure and communication... Read More >>
Offers examples and templates for crafting or revamping your security program in the form of an Enterprise-Wide... Read More >>
This volume covers topics such as: biometrics; cryptography and electronic signatures on smart card security; formal... Read More >>
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how... Read More >>
These are the proceedings of CHES 2001, the third Workshop on Cryptographic Hardware and Embedded Systems. The ?rst... Read More >>
This title constitutes the thoroughly refereed post-proceedings of the International Conference on Cryptography... Read More >>
A self-study resource for Microsoft exam 70-227. Read More >>
This is an authoritative security handbook from the CERT Coordination Center, the oldest computer security response... Read More >>
Using a problem-oriented approach, this book walks you through almost everything from protecting against network... Read More >>
The new second edition focuses on the platform features of Java that provide security--the class loader, bytecode... Read More >>
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical... Read More >>
Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure... Read More >>
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security... Read More >>