Computer security Books

Sidebar Sidebar Sidebar
  • Quantum Computational Number Theory Quantum Computational Number Theory
    Add to Cart The item has been added

    Quantum Computational Number Theory

    This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to...
    $184.00

    Add to Cart The item has been added
  • The Global Cyber-Vulnerability Report The Global Cyber-Vulnerability Report
    Add to Cart The item has been added

    The Global Cyber-Vulnerability Report

    This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and...
    $220.00

    Add to Cart The item has been added
  • Advances to Homomorphic and Searchable Encryption Advances to Homomorphic and Searchable Encryption
    Add to Cart The item has been added

    Advances to Homomorphic and Searchable Encryption

    This book presents the current state of the literature on the fields of homomorphic and searchable encryption, from both theoretical and practical points of view. Homomorphic and searchable encryption are still relatively novel and rapidly evolving areas...
    $298.00

    Add to Cart The item has been added
  • Data Protection in a Post-Pandemic Society Data Protection in a Post-Pandemic Society
    Add to Cart The item has been added

    Data Protection in a Post-Pandemic Society

    This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT),...
    $348.00

    Add to Cart The item has been added
  • Public-Key Cryptography - PKC 2023 Public-Key Cryptography - PKC 2023
    Add to Cart The item has been added

    Public-Key Cryptography - PKC 2023

    The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49...
    $249.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Autonomous Intelligent Cyber Defense Agent (AICA)

    This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical...
    $270.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Security and Risk Analysis for Intelligent Edge Computing

    This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this related field. Practical areas in both...
    $337.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    Blockchain for Cybersecurity in Cyber-Physical Systems

    This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research...
    $335.00

    Add to Cart The item has been added
  • Perfect Secrecy in IoT Perfect Secrecy in IoT
    Add to Cart The item has been added

    Perfect Secrecy in IoT

    Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the...
    $227.00

    Add to Cart The item has been added
  • The Technological Competence of Arbitrators The Technological Competence of Arbitrators
    Add to Cart The item has been added

    The Technological Competence of Arbitrators

    Arbitration is facing revolutionary changes due to new technologies' irruption into the entire arbitration proceeding. Wide-ranging technical-legal concepts such as e-discovery, e-hearing, cyber-security protocol, e-deliberations, algorithmic...
    $238.00

    Add to Cart The item has been added
  • Principles and Practice of Blockchains Principles and Practice of Blockchains
    Add to Cart The item has been added

    Principles and Practice of Blockchains

    This book provides an essential compilation of relevant and cutting edge academic and industry work on key Blockchain topics. This book concentrates on a wide range of advances related to Blockchains which include, among others, Blockchain principles,...
    $227.00

    Add to Cart The item has been added
  • Secure and Trusted Cyber Physical Systems Secure and Trusted Cyber Physical Systems
    Add to Cart The item has been added

    Secure and Trusted Cyber Physical Systems

    This book highlights the latest design and development of security issues and various defences to construct safe, secure and trusted Cyber-Physical Systems (CPS). In addition, the book presents a detailed analysis of the recent approaches to security...
    $227.00

    Add to Cart The item has been added
  • Cybercomplexity Cybercomplexity
    Add to Cart The item has been added

    Cybercomplexity

    This book tackles the problem of complexity within IT environments, i.e., "Cybercomplexity," which is generally recognized as a principal source of cybersecurity risk. The book first defines complexity and simplifies its analysis by assuming a...
    $337.00

    Add to Cart The item has been added
  • Advances in Cryptology - EUROCRYPT 2022 Advances in Cryptology - EUROCRYPT 2022
    Add to Cart The item has been added

    Advances in Cryptology - EUROCRYPT 2022

    The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May -...
    $335.00

    Add to Cart The item has been added
  • Advances in Artificial Intelligence and Security Advances in Artificial Intelligence and Security
    Add to Cart The item has been added

    Advances in Artificial Intelligence and Security

    The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full...
    $216.00

    Add to Cart The item has been added
  • Quantum Key Distribution Networks Quantum Key Distribution Networks
    Add to Cart The item has been added

    Quantum Key Distribution Networks

    This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical...
    $227.00

    Add to Cart The item has been added
  • Citizen Privacy Framework Citizen Privacy Framework
    Add to Cart The item has been added

    Citizen Privacy Framework

    This book presents the concept of a fuzzy-based recommender system for user account privacy settings that can be used for citizen participation on online political platforms. The elaborated components are exemplarily based on the needs of a political...
    $227.00

    Add to Cart The item has been added
  • Progress in Cryptology - INDOCRYPT 2021 Progress in Cryptology - INDOCRYPT 2021
    Add to Cart The item has been added

    Progress in Cryptology - INDOCRYPT 2021

    This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology in India, INDOCRYPT 2021, which was held in Jaipur, India, during December 12-15, 2021.The 27 full papers included in these proceedings were carefully...
    $227.00

    Add to Cart The item has been added
  • Advances in Cryptology - ASIACRYPT 2021 Advances in Cryptology - ASIACRYPT 2021
    Add to Cart The item has been added

    Advances in Cryptology - ASIACRYPT 2021

    The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10,...
    $184.00

    Add to Cart The item has been added
  • Machine Learning for Cyber Agents Machine Learning for Cyber Agents
    Add to Cart The item has been added

    Machine Learning for Cyber Agents

    The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking...
    $259.00

    Add to Cart The item has been added
  • Security and Privacy in Communication Networks Security and Privacy in Communication Networks
    Add to Cart The item has been added

    Security and Privacy in Communication Networks

    This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference...
    $227.00

    Add to Cart The item has been added
  • Mobile Multimedia Communications Mobile Multimedia Communications
    Add to Cart The item has been added

    Mobile Multimedia Communications

    This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Mobile Multimedia Communications, Mobimedia 2021, held in July 2021. Due to COVID-19 pandemic the conference was held virtually. The 66...
    $238.00

    Add to Cart The item has been added
  • Quantum Computing Environments Quantum Computing Environments
    Add to Cart The item has been added

    Quantum Computing Environments

    This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition towards the quantum computing application in various sectors. The book provides a comprehensive insight into the quantum mechanics and...
    $259.00

    Add to Cart The item has been added
  • Advances in Digital Forensics XVII Advances in Digital Forensics XVII
    Add to Cart The item has been added

    Advances in Digital Forensics XVII

    Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital...
    $238.00

    Add to Cart The item has been added
  • Artificial Intelligence in Cyber Security Artificial Intelligence in Cyber Security
    Add to Cart The item has been added

    Artificial Intelligence in Cyber Security

    The book provides a valuable reference for cyber security experts, digital forensic practitioners and network security professionals. In recent years, AI has gained substantial attention from researchers in both academia and industry, and as a result...
    $348.00

    Add to Cart The item has been added
  • Partially Homomorphic Encryption Partially Homomorphic Encryption
    Add to Cart The item has been added

    Partially Homomorphic Encryption

    This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms:...
    $216.00

    Add to Cart The item has been added
  • Challenges in the IoT and Smart Environments Challenges in the IoT and Smart Environments
    Add to Cart The item has been added

    Challenges in the IoT and Smart Environments

    This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer,...
    $270.00

    Add to Cart The item has been added
  • Topics in Cryptology - CT-RSA 2021 Topics in Cryptology - CT-RSA 2021
    Add to Cart The item has been added

    Topics in Cryptology - CT-RSA 2021

    This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2021, CT-RSA 2021, held in San Francisco, CA, USA, in May 2021.*The 27 full papers presented in this volume were carefully reviewed and selected from 100...
    $216.00

    Add to Cart The item has been added
  • Public-Key Cryptography - PKC 2021 Public-Key Cryptography - PKC 2021
    Add to Cart The item has been added

    Public-Key Cryptography - PKC 2021

    The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was...
    $238.00

    Add to Cart The item has been added
  • Smart Log Data Analytics Smart Log Data Analytics
    Add to Cart The item has been added

    Smart Log Data Analytics

    This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel...
    $249.00

    Add to Cart The item has been added
  • Sensemaking for Security Sensemaking for Security
    Add to Cart The item has been added

    Sensemaking for Security

    This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as 'messes'...
    $184.00

    Add to Cart The item has been added
  • Blockchain Security in Cloud Computing Blockchain Security in Cloud Computing
    Add to Cart The item has been added

    Blockchain Security in Cloud Computing

    This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly...
    $281.00

    Add to Cart The item has been added
  • Technology Development for Security Practitioners Technology Development for Security Practitioners
    Add to Cart The item has been added

    Technology Development for Security Practitioners

    This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the...
    $220.00

    Add to Cart The item has been added
  • Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing
    Add to Cart The item has been added

    Device-Independent Quantum Information Processing

    Device-independent quantum cryptography is a method for exchanging secret messages over potentially insecure quantum communication channels, such as optical fibers. In contrast to conventional quantum cryptography, security is guaranteed even if the...
    $335.00

    Add to Cart The item has been added
  • Linking Sensitive Data Linking Sensitive Data
    Add to Cart The item has been added

    Linking Sensitive Data

    This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms...
    $270.00

    Add to Cart The item has been added
  • Wireless Algorithms, Systems, and Applications Wireless Algorithms, Systems, and Applications
    Add to Cart The item has been added

    Wireless Algorithms, Systems, and Applications

    The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The conference was planned to take place in...
    $184.00

    Add to Cart The item has been added
  • New Frontiers in Cryptography New Frontiers in Cryptography
    Add to Cart The item has been added

    New Frontiers in Cryptography

    This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography. Moreover, this book covers cryptography primitives and its usage...
    $216.00

    Add to Cart The item has been added
Computer security