Free Delivery Over $100
10034 books were found.
Presents foundational and practical issues in programming languages and systems and features in the following areas:... Read More >>
In cyber-based systems, tasks can be formulated as learning problems and approached as machine-learning algorithms.... Read More >>
Describes the advances in securing group communications. This book focuses on tailoring the security solution to... Read More >>
This book constitutes the refereed proceedings of the 6th International Workshop Radio Frequency Identification:... Read More >>
Open Source Systems Security Certification discusses Security Certification Standards and establishes the need to... Read More >>
"So, you've got this really cool WordPress blog! You're feeling like all is really great. Then, one morning, you... Read More >>
Online Business Security Systems applies the concept of synchronization to security of global heterogeneous and... Read More >>
A comprehensive survey of computer network security concepts, methods, and practices. This broad-ranging text/reference... Read More >>
Presents some of the important research trends reflected in advances in computer security, including: security protocol... Read More >>
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions.... Read More >>
In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations... Read More >>
This year IWSEC 2010 had three tracks, the Foundations of Security (Track I), Security in Networks and Ubiquitous... Read More >>
Power analysis attacks allow the extraction of secret information from smart cards. In all these applications, the... Read More >>
Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing... Read More >>
Read More >>
The term “risk” is known from many fields, and we are used to references to contractual risk, economic risk, operational... Read More >>
"Research from states with different cultures on the identification of citizens and ID cards is combined towards... Read More >>
Based on the paradigm of model-driven security, the authors of this book show how to systematically design and realize... Read More >>
This text introduces a complete and concise view of network security. It provides in-depth theoretical coverage... Read More >>
Smart Cards, Tokens, Security and Applications provides a broad overview of the many card systems and solutions... Read More >>
Together with a brief introduction into grid computing in general and underlying security technologies, this book... Read More >>
This book presents the most interesting talks given at ISSE 2010 - the forum for the inter-disciplinary discussion... Read More >>
An exploration of security issues in self-organizing networks, this book reflects the research and advances to address... Read More >>
Applies unique quantitative models derived from decision, control, and game theories to understanding diverse network... Read More >>