Add Wish List Add to Cart The item has been added Foundations of Security Analysis and Design Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity,... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Data and Applications Security XIX The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was held August 7-10, 2005 at the University of C- necticut in Storrs, Connecticut. The objectives of the working conference were to... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Detection of Intrusions and Malware, and Vulnerability Assessment On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA). DIMVA is organized by the... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Sequences and Their Applications - SETA 2004 This volume contains the refereed proceedings of the 3rd International Conf- ence on Sequences and Their Applications (SETA 2004), held in Seoul, Korea during October 24-28, 2004. The previous two conferences, SETA 1998 and... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security Practice and Experience The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security in Pervasive Computing This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard,Germany.The objective of this second conference was to develop new security... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Topics in Cryptology -- CT-RSA 2005 The RSA Conferenceis attended by over10,000securityprofessionalseach year. The Cryptographers' Track (CT-RSA), one of several parallel tracks at the c- ference, provides an excellent opportunity for cryptographers to showcase... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security in Communication Networks The 4th International Conference on Security in Communication Networks 2004 (SCN2004)washeldatthe"DioceseHall"oftheArchdioceseofAmal?-Cavade' Tirreni and the "Armorial Bearings Hall" of the Archbishop Palace in Amal?, Italy, on... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Progress in Cryptology - INDOCRYPT 2004 The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this series is increasing every year. The number of papers submitted to INDOCRYPT 2004 was 181, out of which... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Computer Science - ASIAN 2004, Higher Level Decision Making The9thAsianComputingScienceConferencewasheldinChiangMaiinDec- ber 2004. This volume contains papers that were presented at that conference. The conference was dedicated to Jean-Louis Lassez, on the occasion of his ?fth cycle... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computer Safety, Reliability, and Security Theimportanceofsafetyandsecurityisgrowingsteadily.Safetyisaqualityc- racteristic that traditionally has been considered to be important in embedded systems, and security is usually an essential property in business applications... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Data Management Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Foundations of Security Analysis and Design II Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Public Key Cryptography -- PKC 2004 PKC2004wasthe7thInternationalWorkshoponPracticeandTheoryinPublic Key Cryptography and was sponsored by IACR, the International Association for Cryptologic Research (www. iacr. org). This year the workshop was organized 2 in... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security Applications The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Formal Aspects of Security Preface Formal Aspects of Security (FASec) was held at Royal Holloway, University of London, 18-20 December 2002. The occasion celebrated a Jubilee, namely the 25thanniversaryoftheestablishmentofBCS-FACS,theFormalAspectsofC-... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Protocols Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was "Discerning the Protocol... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Fast Software Encryption Fast Software Encryption is now a 10-year-old workshop on symmetric crypt- raphy, including the design and cryptanalysis of block and stream ciphers, as well as hash functions. The ?rst FSE workshop was held in Cambridge in... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber-Physical Systems Security The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added AI in Cybersecurity This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than... RRP: $348.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Designing for Privacy and its Legal Framework This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - CRYPTO 2018 The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Hardware IP Security and Trust This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security Practices This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and... RRP: $268.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Vehicular Cyber Physical Systems This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Resiliency Analytics for Smart Grids This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Geometry, Algebra and Applications This volume collects contributions written bydifferent experts in honor of Prof. Jaime Muñoz Masqué. It covers awide variety of research topics, from differential geometry to algebra, butparticularly focuses on the geometric formulation of... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Recent Advances in Systems Safety and Security This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security - IWSSS, held in 2014 and... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Theory of Cryptography The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.The total of 51 revised full papers presented in... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Modern Data Strategy This book contains practical steps business users can take to implement data management in a number of ways, including data governance, data architecture, master data management, business intelligence, and others. It defines data strategy, and covers... RRP: $249.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Hardware Trojan War This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse... RRP: $298.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Lai-Massey Cipher Designs This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related... RRP: $335.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptographic Hardware and Embedded Systems - CHES 2017 This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully reviewed and... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Network Security Metrics This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - CRYPTO 2017 The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017.The 72 revised full papers... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Differential Privacy and Applications This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy... RRP: $335.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Data Analytics and Decision Support for Cybersecurity The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data science... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Proceedings of the 2nd Workshop on Communication Security This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Medical Image Watermarking This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. This book emphasizes on medical image watermarking to ensure the authenticity of transmitted medical information. It begins with an... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Preserving Privacy Against Side-Channel Leaks This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Quest to Cyber Superiority This book explains how major world economies are recognizing the need for a major push in cyber policy environments. It helps readers understand why these nations are committing substantial resources to cybersecurity, and to the development of standards,... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Combatting Cybercrime and Cyberterrorism This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them... RRP: $268.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Architecting User-Centric Privacy-as-a-Set-of-Services How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Attribute-based Credentials for Trust The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computational Intelligence in Digital Forensics Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis in forensic encompasses the study of pattern analysis that answer the question of interest in security, medical, legal, genetic studies and... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Physical-Layer Security for Cooperative Relay Networks This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Data Privacy Management, and Security Assurance This book constitutes the revised selected papers of the 10th International Workshop on Data Privacy Management, DPM 2015, and the 4th International Workshop on Quantitative Aspects in Security Assurance, QASA 2015, held in Vienna, Austria, in September... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Big Data Concepts, Theories, and Applications Thisbook covers three major parts of Big Data: concepts, theories andapplications. Written by world-renowned leaders in Big Data, this book exploresthe problems, possible solutions and directions for Big Data in research andpractice. It also... RRP: $270.00 Add to Cart The item has been added