Free Delivery Over $100
4195 books were found.
Read More >>
This book outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities... Read More >>
DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. Read More >>
Appropriate for all graduate-level and advanced undergraduate courses in cryptography and related mathematical fields.... Read More >>
This book constitutes the refereed post-proceedings of the Second International Conference on High Performance Networking,... Read More >>
This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in... Read More >>
With over 300 new entries, appearing in an A-Z format, this title provides access to information on various aspects... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
This authoritative exam guide prepares readers to take the first step towards the coveted CISSP certification-the... Read More >>
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key,... Read More >>
This volume represents the refereed proceedings of the ""Sixth International Conference on Finite Fields and Applications... Read More >>
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital... Read More >>
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC... Read More >>
The papers are organized in topical sections on usability, architecture and framework security, mobile identity... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security... Read More >>
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information... Read More >>
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical... Read More >>
This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public... Read More >>
Security experts and trainers cover all exam objectives for this new IT security certification in detail and provide... Read More >>
This book is the 7th volume in the annual series produced by the International Federation for Information Processing... Read More >>
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded... Read More >>
This book constitutes the refereed proceedings of the 5th Provable Security Conference held in in Xi'an, China,... Read More >>