Free Delivery Over $100
4215 books were found.
Read More >>
Drawing on the proceedings of EUROCRYPT '95, the theory and application of cryptographic techniques is discussed... Read More >>
The shock waves from it ultimately included front page treatment in The New York Times, repeated questions to the... Read More >>
Contains 21 papers from the 4th IFIP Working Conference on Dependable Computing for Critical Applications which... Read More >>
Using non-technical, jargon-free language, it takes a look at the issues of privacy in E-mail, rates the security... Read More >>
PGP is a freely available encryption program that protects the privacy of files and electronic mail. It uses powerful... Read More >>
Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Grosse Beruhmtheit... Read More >>
This book summarizes many real events involving computer technologies and the people who depend on those technologies.... Read More >>
This monograph describes a programming methodology based upon programming paradigms and generic programs and demonstates... Read More >>
This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in... Read More >>
There will also be a panel discussion on “Securing an Electronic World: Are We Ready?” The panel members will be:... Read More >>
This volume comprises a collection of papers presented at the Workshop on Information Protection, held in Moscow,... Read More >>
The 26 papers are organized in sections on block ciphers, stream ciphers, software performance, cryptanalysis, hash... Read More >>
The papers cover a variety of issues, relating to both mandatory and discretionary security, including security... Read More >>
Covers software fault tolerance with emphasis on distributed systems. Key topics covered include fail stop processors,... Read More >>
This volume contains a selection of refereed papers from the 1993 Canadian Workshop on Information Theory, held... Read More >>
Die Kryptologie, eine jahrtausendealte ""Geheimwissenschaft"", gewinnt für den Informatiker zusehends praktische... Read More >>
There was also one invited talk at the conference, presented by Miles Smid, the title of which was “A Status Report... Read More >>
The programme for the Second Safety-critical Systems Symposium was planned to examine the various aspects of technology... Read More >>
This handbook summarizes more than 50 of the major problems of building and maintaining software projects, and outlines... Read More >>
Eurocrypt is a series of open workshops on the theory andapplication of cryptographic techniques. The papers... Read More >>
For engineers and scientists interested in computer securit Tutorial in style, this volume provides a comprehensive... Read More >>
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use... Read More >>
The program committee accepted 38 papers for presentation. These proceedings contains these 40 papers plus 3 papers... Read More >>
This volume is based on a course held several times, andagain in 1993, at the ESAT Laboratorium of the Department... Read More >>