Free Delivery Over $100
10034 books were found.
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When... Read More >>
Read More >>
In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism... Read More >>
This book constitutes the proceedings of the 15th International Workshop on Cryptographic Hardware and Embedded... Read More >>
A guide that skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as... Read More >>
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Revised and updated with... Read More >>
Fully revised and updated with the latest data from the field, Network Security, Firewalls, and VPNs, Second Edition... Read More >>
Giving the reader information relating to all aspects of communications security, this book begins at the base ideas... Read More >>
Essential for anyone who works with technology in the field, E-DISCOVERY is a ""hands-on, how-to"" training guide... Read More >>
Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary... Read More >>
This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies,... Read More >>
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications... Read More >>
This book constitutes the refereed proceedings of the 4th International Conference on Interactive Theorem Proving,... Read More >>
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that... Read More >>
The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and... Read More >>
Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits—from... Read More >>
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International... Read More >>
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics,... Read More >>
This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information... Read More >>