Free Delivery Over $100
4195 books were found.
Security is probably the most critical factor for the development of the Information Society. E-government, e-commerce,... Read More >>
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the... Read More >>
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three... Read More >>
The development and integration of integrity and internal control mechanisms into information system infrastructures... Read More >>
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security... Read More >>
This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on... Read More >>
With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that... Read More >>
Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure... Read More >>
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency... Read More >>
The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security), jointly... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on... Read More >>
This text introduces the vast and fascinating area of computational number theory. It treats algorithms for common... Read More >>
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use,... Read More >>
Research Directions in Data and Applications Security describes original research results and innovative practical... Read More >>
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a... Read More >>
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security... Read More >>
This book constitutes the refereed proceedings of the International Conference on Information and Communication... Read More >>
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in... Read More >>
The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track... Read More >>
This book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference,... Read More >>
This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013,... Read More >>
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software... Read More >>
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security... Read More >>