Free Delivery Over $100
4195 books were found.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on... Read More >>
Focuses on three areas of practice and research progress in information technologies: Methods of Artificial Intelligence;... Read More >>
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together.... Read More >>
This book presents the challenges of designing hierarchical cryptographic key management algorithms to implement... Read More >>
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence... Read More >>
This modem introduction to the foundations of logic, mathematics, and computer science answers frequent questions... Read More >>
The subject of this book is predictive modular neural networks and their ap plication to time series problems:... Read More >>
The book introduces new techniques which imply rigorous lower bounds on the complexity of some number theoretic... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security,... Read More >>
This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC... Read More >>
This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied... Read More >>
Suitable for readers who want to help organizations protect critical information assets and secure their systems... Read More >>
This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications... Read More >>
Designed as a professional book for practitioners and researchers working in the cyber security field, advanced... Read More >>
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and... Read More >>
In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures... Read More >>
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012,... Read More >>
Read More >>
A framework for network security which may be used by the military, government, industry, and academia network personnel.... Read More >>
This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks... Read More >>
This book is the eighth volume in the annual series produced by the International Federation for Information Processing... Read More >>
The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes... Read More >>
The papers are organized in topical sections on applied cryptography and security protocols, access control and... Read More >>
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting... Read More >>