Free Delivery Over $100
4215 books were found.
The subjects covered include formal methods and models, safety assessment and analysis, verification and validation,... Read More >>
This volume contains the proceedings of ASIACRYPT '91, thefirst international conference on the theory... Read More >>
This book identifies and explains all the modern standardized methods of achieving network security in both TCP/IP... Read More >>
The articles cover allmain topics in modern computer and communications securityresearch.These include:-... Read More >>
DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. Read More >>
This volume presents the proceedings of Eurocrypt '92, held in Hungary. The papers are organized into parts including... Read More >>
0 e This is the proceedings of the first annual symposium of the Safety-critical Systems Club (The Watershed Media... Read More >>
Technical overview of the security of the mechanisms used in the commercial UNIX designed to help readers ensure... Read More >>
Read More >>
This full semester book is written by a well-recognized authority in computer security. The author takes a step-by-step... Read More >>
The aim of this symposium is to further the progress of research in computer security by bringing together researchers... Read More >>
This book and disk package contains Viruscan, to help people without technical knowledge to avoid computer viruses.... Read More >>
New computer viruses appear almost daily. They, and other software menaces, represent an ongoing threat to the security... Read More >>
It contains reports on such landmark systems as SeaView, LDV, ASD, Secure Sybase, the UNISYS secure distributed... Read More >>
This report on the state of the art and future directions ofpublic-key cryptography is published in accordance... Read More >>
Cryptography (the science of secret writing) and coding theory (concerned with information integrity) are closely... Read More >>
This monograph isdevoted to a new aspect of stream ciphers, namely thestability theory of stream ciphers, with... Read More >>
The 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer... Read More >>
Aims to demystify PC viruses, providing clear information about this relatively new PC problem. It enables managers... Read More >>
Chipkarten sind Kleinstrechner in Scheckkartenformat, die selbständig Daten verwalten und verarbeiten können. Nicht... Read More >>
Verlasslichkeit von Informationstechnik ist eine Systemqualitat im Verhaltnis zwischen technischem System und menschlichem... Read More >>