Free Delivery Over $100
4195 books were found.
This book constitutes the refereed proceedings of the first International Conference on Principles of Security and... Read More >>
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop... Read More >>
This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains... Read More >>
Die Kryptologie, eine jahrtausendealte ""Geheimwissenschaft"", gewinnt zusehends praktische Bedeutung für den Schutz... Read More >>
Designed for technologists or medical practitioners seeking to gain entry into the field of healthcare information... Read More >>
Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on... Read More >>
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area... Read More >>
This book introduces a novel Noiseless Steganography Paradigm (Nostega) that neither hides data in a noise nor produces... Read More >>
The book has many novel features including: full provision of web-based material on almost every topic covered;... Read More >>
Read More >>
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012,... Read More >>
The 7 revised full papers presented together with 7 idea papers were carefully reviewed and selected from 53 submissions.... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure... Read More >>
Constitutes the post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Distributed Computing and... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security... Read More >>
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop... Read More >>
"A short book in the ""Web Security Topics"" series, by the well-known authors Nigel and Jenny Chapman. Web applications... Read More >>
The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and... Read More >>