Free Delivery Over $100
10349 books were found.
Read More >>
This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and... Read More >>
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital... Read More >>
The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother... Read More >>
In some cases, certain coherent structures can exist in stochastic dynamic systems almost in every particular realization... Read More >>
This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management,... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics... Read More >>
Reputation Management: Slandered and Helpless - In Defense of Your Reputation Online & Offline is an eye-opening... Read More >>
The framework is intended to distill privacy-related digital identity requirements (business interoperability) into... Read More >>
This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on... Read More >>
This book constitutes the refereed proceedings of the 8th IFIP WG 6.6 International Conference on Monitoring and... Read More >>