Free Delivery Over $100
10773 books were found.
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors,... Read More >>
Read More >>
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security... Read More >>
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security... Read More >>
""Cloud Computing Protected"" describes the most important security challenges that organizations face by adopting... Read More >>
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational... Read More >>
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on... Read More >>
In order to catch a thief, it takes a thief. In order to catch a hacker, it takes a hacker. In order to catch an... Read More >>
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013,... Read More >>
Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores... Read More >>
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial,... Read More >>
This text examines police administration from multiple perspectives: a systems perspective (emphasizing the interrelatedness... Read More >>
Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on,... Read More >>
The U.S. Navy requires an agile and adaptable acquisition process that can field new information technology capabilities... Read More >>
Identity authentication and authorization are integral tasks in the digital world. This book describes technology... Read More >>
Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's... Read More >>
A large international conference on Advances in Machine Learning and Systems Engineering was held in UC Berkeley,... Read More >>
This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications,... Read More >>
To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to... Read More >>
While the innovation and phenomenon of social network applications has greatly impacted society, the economy, and... Read More >>