Free Delivery Over $100
4195 books were found.
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security,... Read More >>
Read More >>
For computer scientists, especially those in the security field, the use of chaos has been limited to the computation... Read More >>
Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus... Read More >>
The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn... Read More >>
Aus der Analyse bisheriger Ansätze des Data Warehousing werden in diesem Buch Lösungen für essenzielle Problemstellungen... Read More >>
This book not only brings together current sources of information on spyware and adware but also looks at the future... Read More >>
This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012,... Read More >>
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies... Read More >>
This is a comprehensive, up-to-date revision of the market-leading CISSP training resource from the #1 name in IT... Read More >>
This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech... Read More >>
Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained... Read More >>
Die Sicherheit einer IT-Komponente hängt meist direkt von einer oder mehreren anderen Komponenten ab, wobei diese... Read More >>
This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99,... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security,... Read More >>
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in... Read More >>
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building... Read More >>
Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining... Read More >>
The proceedings of the 5th International Conference on Finite Fields and Applications look at the applications of... Read More >>
This book constitutes the proceedings of the 5th International Conference on Advances in Information Technology,... Read More >>
Das Buch bietet einen umfassenden Überblick über die Grundlagen moderner kryptographischer Verfahren und ihre programmtechnische... Read More >>
This book constitutes the refereed proceedings of the 5th International Workshop on Multiple Access Communications,... Read More >>
This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application... Read More >>