Free Delivery Over $100
4195 books were found.
Steganography involves the art of concealing one message or data file within another. Stenographic technologies... Read More >>
Espionage (colloquially, spying) is the obtaining of secret orconfidential information without the permission of... Read More >>
Offensive cyber counterintelligence concepts, methods, and implications in a post-Edward Snowden world Read More >>
This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security... Read More >>
Read More >>
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward... Read More >>
In this book the authors first describe the background of trusted platforms and trusted computing and speculate... Read More >>
It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of... Read More >>
The need for information privacy and security continues to grow and gets increasingly recognized. In this regard,... Read More >>
It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using... Read More >>
Cryptography is the essential and efficient ingredient to the recipe of security solutions. With the arrival of... Read More >>
This book constitutes the proceedings of the 41st International Conference on Current Trends in Theory and Practice... Read More >>
Brings together new ideas on how to deal with potential leaks of valuable customer information. Highlighting the... Read More >>
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks... Read More >>
Constitutes the refereed proceedings of the IFIP TC 8 International Conference on E-Government and E-Services, EGES... Read More >>
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC... Read More >>
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security... Read More >>
Provides complete, focused coverage to prepare students and professionals alike for success on the Certified Information... Read More >>
Presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security,... Read More >>
The papers have been organized in topical sections on Boolean functions, perfect sequences, correlation of arrays,... Read More >>
This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014,... Read More >>
This book constitutes the proceedings of the First International Conference on Security Standardisation Research,... Read More >>