Free Delivery Over $100
4195 books were found.
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security... Read More >>
* Makes deep mathematical problems accessible to computer scientists and engineers * Based on classroom tested... Read More >>
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed... Read More >>
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key... Read More >>
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols,... Read More >>
Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on... Read More >>
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013,... Read More >>
GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including... Read More >>
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial,... Read More >>
Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray... Read More >>
Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results... Read More >>
Addressing the various security issues confronting our Information Society, this title covers the following topics:... Read More >>
This is a comprehensive reference to topics in Biometrics, including concepts, modalities, algorithms, devices,... Read More >>
NIST SP 800-133 Cryptography is often used in an information technology security environment to protect data that... Read More >>
To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to... Read More >>
Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC... Read More >>
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security... Read More >>
* Sorting, often perceived as rather technical, is not treated as a separate chapter, but is used in many examples... Read More >>
This book describes the landscape of cloud computing from first principles, leading the reader step-by-step through... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information... Read More >>