Free Delivery Over $100
4195 books were found.
This new book provides a presentation of a flexible, platform-independent cryptographic security architecture which... Read More >>
Special attention is paid to terms which most often prevent educated readers from understanding journal articles... Read More >>
A resource and monograph for all security researchers and practitioners who want to understand and effectively use... Read More >>
Russian Business in the Brüning Era.- Reviews of Literature: A Review of the New Literature on Business History.-... Read More >>
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is... Read More >>
Multiple-Base Number System: Theory and Applications Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security... Read More >>
This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation... Read More >>
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security,... Read More >>
This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding,... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security,... Read More >>
Read More >>
The only book to provide a unified view of the interplay between computational number theory and cryptographyComputational... Read More >>
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: <ul>... Read More >>
The book treats four fundamental problems: the number of primes below a given limit, the approximate number of primes,... Read More >>
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT... Read More >>
This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China,... Read More >>
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With... Read More >>
"""Thorough and comprehensive coverage from one of the foremost experts in browser security."" —Tavis Ormandy, Google... Read More >>
Designed as the most comprehensive CompTIA Security+ self-study package, this Boxed Set includes CompTIA Security+... Read More >>
The papers cover a wide range of topics in the field of post-quantum public key cryptosystems such as cryptosystems... Read More >>