Free Delivery Over $100
10034 books were found.
Provides readers with an overview of the cloud and how to implement cloud computing in their organizations. This... Read More >>
Aim: Provides an in-depth and holistic view of security and solutions from practical to theoretical aspects.Covering... Read More >>
"""This book examines the current scope of theoretical and practical applications on the security of mobile and... Read More >>
This book presents the most interesting talks given at ISSE 2013 – the forum for the inter-disciplinary discussion... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security,... Read More >>
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews... Read More >>
Developing an information security program that adheres to the principle of security as a business enabler must... Read More >>
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications... Read More >>
Read More >>
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security... Read More >>
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile... Read More >>
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive,... Read More >>
The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security... Read More >>
This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Internet and Distributed Computing... Read More >>
This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC... Read More >>
This work deals with the ways in which such hidden, non-specified functionality can be introducedinto hardware systems.... Read More >>
LabConnection on DVD for Security+ Guide to Network Security Fundamentals, 4e is packed with powerful computer-based... Read More >>
The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile,... Read More >>
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied... Read More >>
The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based... Read More >>