Free Delivery Over $100
2814 books were found.
The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and... Read More >>
Special attention is paid to terms which most often prevent educated readers from understanding journal articles... Read More >>
This overview of the security problems in modern VLSI design provides a detailed treatment of a newly developed... Read More >>
Read More >>
The ability to harness information and communication technology (ICT) is central to national competitiveness and... Read More >>
The papers are organized in topical sections on social networks, storage and performance management, green computing... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 11th IFIP WG 6.11 Conference on... Read More >>
This book contains a collection of thoroughly refereed papers presented at the 5th International Conference on Evaluation... Read More >>
The papers are organized in topical sections on business process modeling, quality of service, formal methods, XaaS... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security,... Read More >>
Mobile Apps - Programme, die auf Smartphones ausgeführt werden - sind derzeit fast nur bei Konsumenten erfolgreich,... Read More >>
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International SDL Forum, SDL... Read More >>
This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China,... Read More >>
The papers cover a wide range of topics in the field of post-quantum public key cryptosystems such as cryptosystems... Read More >>
This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in... Read More >>
The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor... Read More >>
Here you will learn how to develop an attractive easily readable conceptual business-oriented entity/relationship... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 14th Brazilian Symposium on Formal... Read More >>
This volume is a compendium of recent research and development work pertaining to the problems and issues in the... Read More >>
This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on... Read More >>
Constitutes the refereed proceedings of four workshops held in conjunction with the Third European Conference, ServiceWave... Read More >>