Computer security Books

Sidebar Sidebar Sidebar
  • Futuro Descentralizado Futuro Descentralizado
    Add to Cart The item has been added

    Futuro Descentralizado

    ¿Qué se entiende por blockchain y bitcoin? ¿Cuáles son las trampas y la potencialidad de la Inteligencia Artificial? ¿Cómo interactúan ambas? ¿En qué medida son capaces de cambiar nuestra vida? Estas y otras preguntas se formula Claudio Fiorillo en un...
    $30.00

    Add to Cart The item has been added
  • Counterterrorism and Open Source Intelligence Counterterrorism and Open Source Intelligence
    Add to Cart The item has been added

    Counterterrorism and Open Source Intelligence

    Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of...
    $270.00

    Add to Cart The item has been added
  • Mobile Health Applications Mobile Health Applications
    Add to Cart The item has been added

    Mobile Health Applications

    Dieses Buch beinhaltet eine Untersuchung der rechtlichen Rahmenbedingungen von Mobile Health Applications (mHealth-Anwendungen). Im Zuge der Digitalisierung des Gesundheitswesens halten Gesundheits-Apps vermehrt Einzug in die...
    $298.00

    Add to Cart The item has been added
  • Advances in Cryptology - EUROCRYPT 2016 Advances in Cryptology - EUROCRYPT 2016
    Add to Cart The item has been added

    Advances in Cryptology - EUROCRYPT 2016

    The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016...
    $184.00

    Add to Cart The item has been added
  • Public-Key Cryptography - PKC 2016 Public-Key Cryptography - PKC 2016
    Add to Cart The item has been added

    Public-Key Cryptography - PKC 2016

    Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016.The34 revised papers presented were...
    $92.00

    Add to Cart The item has been added
  • The New Codebreakers The New Codebreakers
    Add to Cart The item has been added

    The New Codebreakers

    This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn's 80th birthday. The title of this books leans on the title of a serious history of cryptology named "The...
    $92.00

    Add to Cart The item has been added
  • Transactions on Computational Science XXVI Transactions on Computational Science XXVI
    Add to Cart The item has been added

    Transactions on Computational Science XXVI

    This, the 26th issue of the Transactions on Computational Science journal, is comprised of ten extended versions of selected papers from the International Conference on Cyberworlds 2014, held in Santander, Spain, in June 2014. The topics covered include...
    $92.00

    Add to Cart The item has been added
  • Boolean Functions and Their Applications in Cryptography Boolean Functions and Their Applications in Cryptography
    Add to Cart The item has been added

    Boolean Functions and Their Applications in Cryptography

    This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional...
    $259.00

    Add to Cart The item has been added
  • Advances in Cryptology - ASIACRYPT 2015 Advances in Cryptology - ASIACRYPT 2015
    Add to Cart The item has been added

    Advances in Cryptology - ASIACRYPT 2015

    The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December...
    $116.00

    Add to Cart The item has been added
  • Advances in Cryptology -- ASIACRYPT 2015 Advances in Cryptology -- ASIACRYPT 2015
    Add to Cart The item has been added

    Advances in Cryptology -- ASIACRYPT 2015

    The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December...
    $184.00

    Add to Cart The item has been added
  • Cryptographic Hardware and Embedded Systems -- CHES 2015 Cryptographic Hardware and Embedded Systems -- CHES 2015
    Add to Cart The item has been added

    Cryptographic Hardware and Embedded Systems -- CHES 2015

    This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully reviewed...
    $92.00

    Add to Cart The item has been added
  • Advances in Cryptology -- CRYPTO 2015 Advances in Cryptology -- CRYPTO 2015
    Add to Cart The item has been added

    Advances in Cryptology -- CRYPTO 2015

    The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015.The 74 revised full papers presented were carefully...
    $122.00

    Add to Cart The item has been added
  • Advances in Cryptology - EUROCRYPT 2015 Advances in Cryptology - EUROCRYPT 2015
    Add to Cart The item has been added

    Advances in Cryptology - EUROCRYPT 2015

    The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers...
    $122.00

    Add to Cart The item has been added
  • Public-Key Cryptography -- PKC 2015 Public-Key Cryptography -- PKC 2015
    Add to Cart The item has been added

    Public-Key Cryptography -- PKC 2015

    This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully...
    $92.00

    Add to Cart The item has been added
  • Applications and Techniques in Information Security Applications and Techniques in Information Security
    Add to Cart The item has been added

    Applications and Techniques in Information Security

    This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were...
    $116.00

    Add to Cart The item has been added
  • Advances in Cryptology -- ASIACRYPT 2014 Advances in Cryptology -- ASIACRYPT 2014
    Add to Cart The item has been added

    Advances in Cryptology -- ASIACRYPT 2014

    The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55...
    $92.00

    Add to Cart The item has been added
  • Security in Computing and Communications Security in Computing and Communications
    Add to Cart The item has been added

    Security in Computing and Communications

    This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, India, in September 2013. The 36 revised full papers presented together with 12 work-in-progress papers...
    $122.00

    Add to Cart The item has been added
  • Cryptography and Security Systems Cryptography and Security Systems
    Add to Cart The item has been added

    Cryptography and Security Systems

    This book constitutes the refereed proceedings of the Third International Conference on Cryptography and Security Systems, CSS 2014, held in Lublin, Poland, in September 2014. The 17 revised full papers presented were carefully reviewed and selected from...
    $92.00

    Add to Cart The item has been added
  • E-Business and Telecommunications E-Business and Telecommunications
    Add to Cart The item has been added

    E-Business and Telecommunications

    This book constitutes the refereed proceedings of the 10th International Joint Conference on E-Business and Telecommunications, ICETE 2013, held in Reykjavik, Iceland, in July 2013. ICETE is a joint international conference integrating four major areas...
    $122.00

    Add to Cart The item has been added
  • Cryptographic Hardware and Embedded Systems -- CHES 2014 Cryptographic Hardware and Embedded Systems -- CHES 2014
    Add to Cart The item has been added

    Cryptographic Hardware and Embedded Systems -- CHES 2014

    This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and...
    $122.00

    Add to Cart The item has been added
  • Advances in Cryptology -- CRYPTO 2014 Advances in Cryptology -- CRYPTO 2014
    Add to Cart The item has been added

    Advances in Cryptology -- CRYPTO 2014

    The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014.The 60 revised full papers presented in LNCS 8616 and...
    $92.00

    Add to Cart The item has been added
  • Data and Applications Security and Privacy XXVIII Data and Applications Security and Privacy XXVIII
    Add to Cart The item has been added

    Data and Applications Security and Privacy XXVIII

    This book constitutes the refereed proceedings of the 28th IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2014, held in Vienna, Austria, in July 2014. The 22 revised full papers and 4 short papers...
    $122.00

    Add to Cart The item has been added
  • Trustworthy Computing and Services Trustworthy Computing and Services
    Add to Cart The item has been added

    Trustworthy Computing and Services

    This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2013, held in Beijing, China, in November 2013. The 49 revised full papers presented were carefully reviewed...
    $122.00

    Add to Cart The item has been added
  • Digital-Forensics and Watermarking Digital-Forensics and Watermarking
    Add to Cart The item has been added

    Digital-Forensics and Watermarking

    This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together...
    $92.00

    Add to Cart The item has been added
  • Selected Areas in Cryptography -- SAC 2013 Selected Areas in Cryptography -- SAC 2013
    Add to Cart The item has been added

    Selected Areas in Cryptography -- SAC 2013

    This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98...
    $92.00

    Add to Cart The item has been added
  • Bio-inspiring Cyber Security and Cloud Services Bio-inspiring Cyber Security and Cloud Services
    Add to Cart The item has been added

    Bio-inspiring Cyber Security and Cloud Services

    This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting-edge technologies,...
    $270.00

    Add to Cart The item has been added
  • Management der Informationssicherheit Management der Informationssicherheit
    Add to Cart The item has been added

    Management der Informationssicherheit

    Dieses Lehrbuch bietet Grundlagenwissen zum Thema Informationssicherheit sowie Informationssicherheitsmanagement. Neben der Erklärung aktueller und relevanter Grundbegriffe bietet es Definitionen und skizziert methodische und rechtliche Rahmen. Die...
    $60.00

    Add to Cart The item has been added
  • ISSE 2015 ISSE 2015
    Add to Cart The item has been added

    ISSE 2015

    This book presents the most interesting talks given at ISSE 2015 - the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include:· Encrypted Communication· ...
    $92.00

    Add to Cart The item has been added
  • ISSE 2014 Securing Electronic Business Processes ISSE 2014 Securing Electronic Business Processes
    Add to Cart The item has been added

    ISSE 2014 Securing Electronic Business Processes

    This book presents the most interesting talks given at ISSE 2014 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014.
    $116.00

    Add to Cart The item has been added
  • ISSE 2013 Securing Electronic Business Processes ISSE 2013 Securing Electronic Business Processes
    Add to Cart The item has been added

    ISSE 2013 Securing Electronic Business Processes

    This book presents the most interesting talks given at ISSE 2013 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include:- Cloud Security, Trust Services, eId & Access...
    $92.00

    Add to Cart The item has been added
  • Handbook of Information and Communication Security Handbook of Information and Communication Security
    Add to Cart The item has been added

    Handbook of Information and Communication Security

    At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called "Y2K" issue. Te Y2K scare was...
    $817.00

    Add to Cart The item has been added
  • Wireless Networks and Security Wireless Networks and Security
    Add to Cart The item has been added

    Wireless Networks and Security

    "Wireless Networks and Security" provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion...
    $335.00

    Add to Cart The item has been added
  • Enterprise Identity Management Enterprise Identity Management
    Add to Cart The item has been added

    Enterprise Identity Management

    ​The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and...
    $220.00

    Add to Cart The item has been added
  • Computational Methods for Counterterrorism Computational Methods for Counterterrorism
    Add to Cart The item has been added

    Computational Methods for Counterterrorism

    Modern terrorist networks pose an unprecedented threat to international security. The question of how to neutralize that threat is complicated radically by their fluid, non-hierarchical structures, religious and ideological motivations, and predominantly...
    $227.00

    Add to Cart The item has been added
  • Advances in Cryptology -- ASIACRYPT 2013 Advances in Cryptology -- ASIACRYPT 2013
    Add to Cart The item has been added

    Advances in Cryptology -- ASIACRYPT 2013

    The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full...
    $122.00

    Add to Cart The item has been added
  • Advances in Cryptology - ASIACRYPT 2013 Advances in Cryptology - ASIACRYPT 2013
    Add to Cart The item has been added

    Advances in Cryptology - ASIACRYPT 2013

    The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full...
    $122.00

    Add to Cart The item has been added
  • Secure IT Systems Secure IT Systems
    Add to Cart The item has been added

    Secure IT Systems

    This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013. The 18 revised regular papers together with 3 short papers and one invited talk were carefully...
    $122.00

    Add to Cart The item has been added
  • Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
    Add to Cart The item has been added

    Research in Attacks, Intrusions, and Defenses

    This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22...
    $92.00

    Add to Cart The item has been added
  • Provable Security Provable Security
    Add to Cart The item has been added

    Provable Security

    This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and...
    $122.00

    Add to Cart The item has been added
  • Cyber Security and Privacy Cyber Security and Privacy
    Add to Cart The item has been added

    Cyber Security and Privacy

    This book constitutes the thoroughly refereed, selected papers on Cyber Security and Privacy EU Forum 2013, held in Belgium, in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers are...
    $116.00

    Add to Cart The item has been added
  • Trusted Systems Trusted Systems
    Add to Cart The item has been added

    Trusted Systems

    This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully...
    $92.00

    Add to Cart The item has been added
  • Advances in Cryptology -- Crypto 2012 Advances in Cryptology -- Crypto 2012
    Add to Cart The item has been added

    Advances in Cryptology -- Crypto 2012

    This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed...
    $92.00

    Add to Cart The item has been added
Computer security