Free Delivery Over $100
10034 books were found.
<p>This book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and... Read More >>
<p>This volume constitutes the refereed proceedings of 11 international workshops held as part of OTM 2010 in Hersonissos,... Read More >>
Constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in... Read More >>
<p>This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application... Read More >>
Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security... Read More >>
Constitutes the post-conference proceedings of the Second International Workshop on Critical Information Infrastructures... Read More >>
Constitutes the refereed proceedings of the Second International Conference on Network-Based Information Systems,... Read More >>
<p>This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network... Read More >>
Constitutes the refereed proceedings of the 7th International Conference on Wired/Wireless Internet Communications,... Read More >>
<p>This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE... Read More >>
<p>This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held... Read More >>
<p>This book constitutes the refereed proceedings of the 9th International Conference on Distributed Computing and... Read More >>
<p>This book responds to the growing need to secure critical infrastructure by creating a starting place for new... Read More >>
<p>This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network... Read More >>
<p>This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security,... Read More >>
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers... Read More >>
Describes various technologies and features in Windows Server 2008, such as improvements to networking and remote... Read More >>
The purpose of this document is to provide guidance to organizations in securing their legacy IEEE 802.11 wireless... Read More >>
Explains the basics, describes the protocols, and discusses advanced topics, by some of the best and brightest experts... Read More >>
"A follow up to the 5th report, ""HL 165-I, session 2006-07"" and the ""Government response"" (Cm 7234)." Read More >>
This book introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in... Read More >>