Free Delivery Over $100
4195 books were found.
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of... Read More >>
This textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview... Read More >>
It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing... Read More >>
This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography,... Read More >>
This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related... Read More >>
This book presents new concepts against Distributed Denial of Service (DDoS) attacks. It follows a systematic approach... Read More >>
With the development of big data, data sharing has become increasingly popular and important in optimizing resource... Read More >>
This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto... Read More >>
This book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data and Applications... Read More >>
This book constitutes the refereed post-conference proceedings of the First International Conference on Applied... Read More >>
Read More >>
Reviews the security aspects of cloud IoT and Android platforms related to steganography, and addresses emerging... Read More >>
Specifically oriented to the needs of information systems students, this book delivers the technology and developments... Read More >>
I am very excited about the prospect of using cryptocurrency, not just as a money equivalent, but using it as a... Read More >>
Archiving has become an increasingly complex process. The challenge is no longer how to store the data but how to... Read More >>
This book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography... Read More >>
Do you want to Defend Yourself from Hacking? Your Customers Never Stop to Use this Complete Guide! Read More >>
Cryptography, as done in this century, is heavily mathematical. But it also has roots in what is computationally... Read More >>
The 3-volume-set LNCS 12696 – 12698 constitutes the refereed proceedings of the 40th Annual International Conference... Read More >>
This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security... Read More >>