Free Delivery Over $100
4195 books were found.
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International... Read More >>
After the introduction, with historical remarks, the author structures the book into a chapter on the description... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec... Read More >>
Read More >>
Explaining the mathematics of cryptographyThe Mathematics of Secrets takes readers on a fascinating tour of the... Read More >>
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS... Read More >>
"Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works.... Read More >>
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various... Read More >>
This book discusses the current technologies of cryptography using DNA computing. It provides a judicious mix of... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice... Read More >>
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting,... Read More >>
In its revised fifth edition, this book covers ethical, social and policy challenges arising from the convergence... Read More >>
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security,... Read More >>
This book discusses how to design and review the security of blockchains enterprise-based applications in roughly... Read More >>
The CryprocurrencyRevolution Is Here! Want to learn more about the super exciting cryptocurrency industryand... Read More >>
This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware,... Read More >>
This book examines different aspects of network security metrics and their application to enterprise networks. One... Read More >>
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined... Read More >>
Offers an account of the theory and practice of quantum cryptography. This book crosses the disciplines of physics,... Read More >>
This book explores alternative ways of accomplishing secure information transfer with incoherent multi-photon pulses... Read More >>
The 47 full papers presented in this volume were carefully reviewed and selected from 64 submissions.This volume... Read More >>
Book Description Positive thinking is very important. It is one of powerful habits that you should really focus... Read More >>