Free Delivery Over $100
4195 books were found.
Read More >>
This book presents state-of-the-art methodologies and a comprehensive introduction to the recognition and representation... Read More >>
This book constitutes revised selected papers from the 20th International Conference on Information Security and... Read More >>
BlockchainHow Bitcoin and Blockchain Are Reshaping the World of FinanceHave you heard the term blockchain get thrown... Read More >>
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2018, CT-RSA 2018,... Read More >>
This handbook provides a complete reference on elliptic and hyperelliptic curve cryptography. Addressing every aspect... Read More >>
The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference... Read More >>
This book constitutes the refereed post-conference proceedings of the First International Conference on Number-Theoretic... Read More >>
Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations... Read More >>
Examines the best approaches for providing quality research, as well as how to effectively manage that information... Read More >>
This book constitutes the revised selected papers from the 12th International Conference on Risk and Security of... Read More >>
GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference... Read More >>
Stylish Designer Notebook. Interior 150 lined pages. Size 6 x 9 . Glossy softcover. Perfect for everyday use. Perfectly... Read More >>
This book contains revised selected papers from the 24th International Conference on Selected Areas in Cryptography,... Read More >>
This book constitutes the refereed proceedings of the First International Conference on Ubiquitous Communications... Read More >>
Presents the proceedings of the 2017 International Conference on Security and Management (SAM '17). Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on... Read More >>
This volume constitutes the refereed proceedings of the Second International Conference on Intelligent Information... Read More >>
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust,... Read More >>