Computer security Books

Sidebar Sidebar Sidebar
  • Foundations of Security Analysis and Design Foundations of Security Analysis and Design
    Add to Cart The item has been added

    Foundations of Security Analysis and Design

    Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity,...
    $122.00

    Add to Cart The item has been added
  • Data and Applications Security XIX Data and Applications Security XIX
    Add to Cart The item has been added

    Data and Applications Security XIX

    The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was held August 7-10, 2005 at the University of C- necticut in Storrs, Connecticut. The objectives of the working conference were to...
    $92.00

    Add to Cart The item has been added
  • Sequences and Their Applications - SETA 2004 Sequences and Their Applications - SETA 2004
    Add to Cart The item has been added

    Sequences and Their Applications - SETA 2004

    This volume contains the refereed proceedings of the 3rd International Conf- ence on Sequences and Their Applications (SETA 2004), held in Seoul, Korea during October 24-28, 2004. The previous two conferences, SETA 1998 and...
    $116.00

    Add to Cart The item has been added
  • Information Security Practice and Experience Information Security Practice and Experience
    Add to Cart The item has been added

    Information Security Practice and Experience

    The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their...
    $122.00

    Add to Cart The item has been added
  • Security in Pervasive Computing Security in Pervasive Computing
    Add to Cart The item has been added

    Security in Pervasive Computing

    This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard,Germany.The objective of this second conference was to develop new security...
    $122.00

    Add to Cart The item has been added
  • Topics in Cryptology -- CT-RSA 2005 Topics in Cryptology -- CT-RSA 2005
    Add to Cart The item has been added

    Topics in Cryptology -- CT-RSA 2005

    The RSA Conferenceis attended by over10,000securityprofessionalseach year. The Cryptographers' Track (CT-RSA), one of several parallel tracks at the c- ference, provides an excellent opportunity for cryptographers to showcase...
    $122.00

    Add to Cart The item has been added
  • Security in Communication Networks Security in Communication Networks
    Add to Cart The item has been added

    Security in Communication Networks

    The 4th International Conference on Security in Communication Networks 2004 (SCN2004)washeldatthe"DioceseHall"oftheArchdioceseofAmal?-Cavade' Tirreni and the "Armorial Bearings Hall" of the Archbishop Palace in Amal?, Italy, on...
    $116.00

    Add to Cart The item has been added
  • Progress in Cryptology - INDOCRYPT 2004 Progress in Cryptology - INDOCRYPT 2004
    Add to Cart The item has been added

    Progress in Cryptology - INDOCRYPT 2004

    The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this series is increasing every year. The number of papers submitted to INDOCRYPT 2004 was 181, out of which...
    $122.00

    Add to Cart The item has been added
  • Computer Safety, Reliability, and Security Computer Safety, Reliability, and Security
    Add to Cart The item has been added

    Computer Safety, Reliability, and Security

    Theimportanceofsafetyandsecurityisgrowingsteadily.Safetyisaqualityc- racteristic that traditionally has been considered to be important in embedded systems, and security is usually an essential property in business applications...
    $122.00

    Add to Cart The item has been added
  • Secure Data Management Secure Data Management
    Add to Cart The item has been added

    Secure Data Management

    Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will...
    $122.00

    Add to Cart The item has been added
  • Foundations of Security Analysis and Design II Foundations of Security Analysis and Design II
    Add to Cart The item has been added

    Foundations of Security Analysis and Design II

    Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc...
    $92.00

    Add to Cart The item has been added
  • Public Key Cryptography -- PKC 2004 Public Key Cryptography -- PKC 2004
    Add to Cart The item has been added

    Public Key Cryptography -- PKC 2004

    PKC2004wasthe7thInternationalWorkshoponPracticeandTheoryinPublic Key Cryptography and was sponsored by IACR, the International Association for Cryptologic Research (www. iacr. org). This year the workshop was organized 2 in...
    $122.00

    Add to Cart The item has been added
  • Information Security Applications Information Security Applications
    Add to Cart The item has been added

    Information Security Applications

    The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and...
    $227.00

    Add to Cart The item has been added
  • Formal Aspects of Security Formal Aspects of Security
    Add to Cart The item has been added

    Formal Aspects of Security

    Preface Formal Aspects of Security (FASec) was held at Royal Holloway, University of London, 18-20 December 2002. The occasion celebrated a Jubilee, namely the 25thanniversaryoftheestablishmentofBCS-FACS,theFormalAspectsofC-...
    $92.00

    Add to Cart The item has been added
  • Security Protocols Security Protocols
    Add to Cart The item has been added

    Security Protocols

    Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was "Discerning the Protocol...
    $122.00

    Add to Cart The item has been added
  • Fast Software Encryption Fast Software Encryption
    Add to Cart The item has been added

    Fast Software Encryption

    Fast Software Encryption is now a 10-year-old workshop on symmetric crypt- raphy, including the design and cryptanalysis of block and stream ciphers, as well as hash functions. The ?rst FSE workshop was held in Cambridge in...
    $92.00

    Add to Cart The item has been added
  • Cyber-Physical Systems Security Cyber-Physical Systems Security
    Add to Cart The item has been added

    Cyber-Physical Systems Security

    The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving...
    $270.00

    Add to Cart The item has been added
  • AI in Cybersecurity AI in Cybersecurity
    Add to Cart The item has been added

    AI in Cybersecurity

    This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than...
    $348.00

    Add to Cart The item has been added
  • Designing for Privacy and its Legal Framework Designing for Privacy and its Legal Framework
    Add to Cart The item has been added

    Designing for Privacy and its Legal Framework

    This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also...
    $270.00

    Add to Cart The item has been added
  • Advances in Cryptology - CRYPTO 2018 Advances in Cryptology - CRYPTO 2018
    Add to Cart The item has been added

    Advances in Cryptology - CRYPTO 2018

    The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented...
    $184.00

    Add to Cart The item has been added
  • Hardware IP Security and Trust Hardware IP Security and Trust
    Add to Cart The item has been added

    Hardware IP Security and Trust

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers...
    $184.00

    Add to Cart The item has been added
  • Information Security Practices Information Security Practices
    Add to Cart The item has been added

    Information Security Practices

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and...
    $268.00

    Add to Cart The item has been added
  • Vehicular Cyber Physical Systems Vehicular Cyber Physical Systems
    Add to Cart The item has been added

    Vehicular Cyber Physical Systems

    This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results...
    $184.00

    Add to Cart The item has been added
  • Security and Resiliency Analytics for Smart Grids Security and Resiliency Analytics for Smart Grids
    Add to Cart The item has been added

    Security and Resiliency Analytics for Smart Grids

    This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential...
    $184.00

    Add to Cart The item has been added
  • Geometry, Algebra and Applications Geometry, Algebra and Applications
    Add to Cart The item has been added

    Geometry, Algebra and Applications

    This volume collects contributions written bydifferent experts in honor of Prof. Jaime Muñoz Masqué. It covers awide variety of research topics, from differential geometry to algebra, butparticularly focuses on the geometric formulation of...
    $184.00

    Add to Cart The item has been added
  • Recent Advances in Systems Safety and Security Recent Advances in Systems Safety and Security
    Add to Cart The item has been added

    Recent Advances in Systems Safety and Security

    This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security - IWSSS, held in 2014 and...
    $184.00

    Add to Cart The item has been added
  • Theory of Cryptography Theory of Cryptography
    Add to Cart The item has been added

    Theory of Cryptography

    The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.The total of 51 revised full papers presented in...
    $184.00

    Add to Cart The item has been added
  • Modern Data Strategy Modern Data Strategy
    Add to Cart The item has been added

    Modern Data Strategy

    This book contains practical steps business users can take to implement data management in a number of ways, including data governance, data architecture, master data management, business intelligence, and others. It defines data strategy, and covers...
    $249.00

    Add to Cart The item has been added
  • The Hardware Trojan War The Hardware Trojan War
    Add to Cart The item has been added

    The Hardware Trojan War

    This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse...
    $298.00

    Add to Cart The item has been added
  • Lai-Massey Cipher Designs Lai-Massey Cipher Designs
    Add to Cart The item has been added

    Lai-Massey Cipher Designs

    This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related...
    $335.00

    Add to Cart The item has been added
  • Cryptographic Hardware and Embedded Systems - CHES 2017 Cryptographic Hardware and Embedded Systems - CHES 2017
    Add to Cart The item has been added

    Cryptographic Hardware and Embedded Systems - CHES 2017

    This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully reviewed and...
    $184.00

    Add to Cart The item has been added
  • Network Security Metrics Network Security Metrics
    Add to Cart The item has been added

    Network Security Metrics

    This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book...
    $238.00

    Add to Cart The item has been added
  • Advances in Cryptology - CRYPTO 2017 Advances in Cryptology - CRYPTO 2017
    Add to Cart The item has been added

    Advances in Cryptology - CRYPTO 2017

    The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.The 72 revised full papers...
    $184.00

    Add to Cart The item has been added
  • Differential Privacy and Applications Differential Privacy and Applications
    Add to Cart The item has been added

    Differential Privacy and Applications

    This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy...
    $335.00

    Add to Cart The item has been added
  • Data Analytics and Decision Support for Cybersecurity Data Analytics and Decision Support for Cybersecurity
    Add to Cart The item has been added

    Data Analytics and Decision Support for Cybersecurity

    The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data science...
    $238.00

    Add to Cart The item has been added
  • Proceedings of the 2nd Workshop on Communication Security Proceedings of the 2nd Workshop on Communication Security
    Add to Cart The item has been added

    Proceedings of the 2nd Workshop on Communication Security

    This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for...
    $270.00

    Add to Cart The item has been added
  • Medical Image Watermarking Medical Image Watermarking
    Add to Cart The item has been added

    Medical Image Watermarking

    This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. This book emphasizes on medical image watermarking to ensure the authenticity of transmitted medical information. It begins with an...
    $184.00

    Add to Cart The item has been added
  • Preserving Privacy Against Side-Channel Leaks Preserving Privacy Against Side-Channel Leaks
    Add to Cart The item has been added

    Preserving Privacy Against Side-Channel Leaks

    This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing...
    $220.00

    Add to Cart The item has been added
  • The Quest to Cyber Superiority The Quest to Cyber Superiority
    Add to Cart The item has been added

    The Quest to Cyber Superiority

    This book explains how major world economies are recognizing the need for a major push in cyber policy environments. It helps readers understand why these nations are committing substantial resources to cybersecurity, and to the development of standards,...
    $184.00

    Add to Cart The item has been added
  • Combatting Cybercrime and Cyberterrorism Combatting Cybercrime and Cyberterrorism
    Add to Cart The item has been added

    Combatting Cybercrime and Cyberterrorism

    This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them...
    $268.00

    Add to Cart The item has been added
  • Architecting User-Centric Privacy-as-a-Set-of-Services Architecting User-Centric Privacy-as-a-Set-of-Services
    Add to Cart The item has been added

    Architecting User-Centric Privacy-as-a-Set-of-Services

    How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the...
    $227.00

    Add to Cart The item has been added
  • Attribute-based Credentials for Trust Attribute-based Credentials for Trust
    Add to Cart The item has been added

    Attribute-based Credentials for Trust

    The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control...
    $227.00

    Add to Cart The item has been added
  • Computational Intelligence in Digital Forensics Computational Intelligence in Digital Forensics
    Add to Cart The item has been added

    Computational Intelligence in Digital Forensics

    Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis in forensic encompasses the study of pattern analysis that answer the question of interest in security, medical, legal, genetic studies and...
    $184.00

    Add to Cart The item has been added
  • Physical-Layer Security for Cooperative Relay Networks Physical-Layer Security for Cooperative Relay Networks
    Add to Cart The item has been added

    Physical-Layer Security for Cooperative Relay Networks

    This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range...
    $227.00

    Add to Cart The item has been added
  • Data Privacy Management, and Security Assurance Data Privacy Management, and Security Assurance
    Add to Cart The item has been added

    Data Privacy Management, and Security Assurance

    This book constitutes the revised selected papers of the 10th International Workshop on Data Privacy Management, DPM 2015, and the 4th International Workshop on Quantitative Aspects in Security Assurance, QASA 2015, held in Vienna, Austria, in September...
    $184.00

    Add to Cart The item has been added
  • Big Data Concepts, Theories, and Applications Big Data Concepts, Theories, and Applications
    Add to Cart The item has been added

    Big Data Concepts, Theories, and Applications

    Thisbook covers three major parts of Big Data: concepts, theories andapplications. Written by world-renowned leaders in Big Data, this book exploresthe problems, possible solutions and directions for Big Data in research andpractice.  It also...
    $270.00

    Add to Cart The item has been added
Computer security