Free Delivery Over $100
4195 books were found.
Neal Koblitz is a co-inventor of one of the two most popular forms of encryption and digital signature, and his... Read More >>
The papers cover all technical aspects of cryptographic research related to the future world with large quantum... Read More >>
This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded... Read More >>
This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014,... Read More >>
This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management,... Read More >>
Read More >>
Starting with early prototypes and proposed applications, this book surveys the longer history of amplifying small... Read More >>
Filled with cutting-edge social engineering testing techniques that are legally and ethically sound, this book fully... Read More >>
Written by two healthcare information security and privacy experts, this definitive resource fully addresses security... Read More >>
This book focuses specifically on physical layer security, a burgeoning topic in security. It consists of contributions... Read More >>
This book is one of the first to cover SAT-solvers and how they can be used in cryptanalysis. It includes chapters... Read More >>
Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly... Read More >>
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications... Read More >>
As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I... Read More >>
It is intended mainly for beginners to the field of information security, written in a way that makes it easy for... Read More >>
In the digital world, the need to protect communications increases every day. While traditional digital encryption... Read More >>
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE... Read More >>
In the frequency domain, MRRs can be used to generate optical millimetre-wave solitons with a broadband frequency... Read More >>
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers,... Read More >>
The papers are organized in topical sections on privacy metrics and comparison, policies, privacy transparency in... Read More >>