Add Wish List Add to Cart The item has been added Algorithms for Data and Computation Privacy This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Cryptography for Networks This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.The 33 papers presented in this volume were carefully reviewed and selected from 87... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Artificial Intelligence and Security This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Fog/Edge Computing For Security, Privacy, and Applications This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area... RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - CRYPTO 2020 Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17-21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020.The 85 papers presented in the... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Digital Forensics XVI Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Adversary-Aware Learning Techniques and Trends in Cybersecurity This book is intended to give researchers and practitioners in the cross-cutting fields of artificial intelligence, machine learning (AI/ML) and cyber security up-to-date and in-depth knowledge of recent techniques for improving the vulnerabilities of... RRP: $308.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security and Privacy This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Building Decentralized Trust This volume brings together a multidisciplinary group of scholars from diverse fields including computer science, engineering, archival science, law, business, psychology, economics, medicine and more to discuss the trade-offs between different... RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Build Your Own Blockchain This book provides a comprehensive introduction to blockchain and distributed ledger technology. Intended as an applied guide for hands-on practitioners, the book includes detailed examples and in-depth explanations of how to build and run a blockchain... RRP: $108.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Redesigning Wiretapping This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11.It pays particular attention to the 1990s, which marked one of the most dramatic... RRP: $249.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Blockchain Cybersecurity, Trust and Privacy This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P... RRP: $281.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cloud Security Auditing This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties... RRP: $216.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added ICT Systems Security and Privacy Protection This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2019, held in Lisbon, Portugal, in June 2019.The 26 revised full papers presented were carefully reviewed... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Human Factors in Cybersecurity This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity in the Electricity Sector This book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions. The author explains the current state of cybersecurity in the... RRP: $270.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cyber Security Analytics and Decision Systems This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of... RRP: $335.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - EUROCRYPT 2019 The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity and Secure Information Systems This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Smart Systems for E-Health The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies... RRP: $281.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Learning-based VANET Communication and Security Techniques This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Ubiquitous Computing and Computing Security of IoT This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy Trends in the Industrial Internet of Things This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber-Development, Cyber-Democracy and Cyber-Defense In this volume, contributors from academia, industry, and policy explore the inter-connections among economic development, socio-political democracy and defense and security in the context of a profound transformation, spurred... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Electronic Postage Systems This book offers the first comprehensive overview of contemporary systems for secure electronic/digital postage. It introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The underlying cryptographic... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Zero Trust Security Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute... RRP: $81.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Information Security Management, Education and Privacy This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that are currently particularly active in Security. The first one is the 10th IFIP... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Research Directions in Data and Applications Security XVIII As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advanced DPA Theory and Practice Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Structured Peer-to-Peer Systems The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Moving Target Defense II Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy in Social Networks Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Spyware and Adware Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security and Privacy for Implantable Medical Devices This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD). It describes in detail new issues termed as lightweight security, due to the... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added E-Commerce Security and Privacy Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Recent Advances in RSA Cryptography Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Applications of Data Mining in Computer Security Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Informed Watermarking This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in a secure, robust and imperceptible fashion. Digital watermarking as a topic... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added System-on-Chip Architectures and Implementations for Private-Key Data Encryption In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Intelligence Management The current rapid development in both computing power and the ability to present and mine complex data sets in useful ways provides the backdrop to Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime. The... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Identity-Based Encryption Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Quantum Attacks on Public-Key Cryptosystems The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Preserving Privacy in Data Outsourcing Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Insider Threats in Cyber Security Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Adaptive Cryptographic Access Control Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Access Control Systems Foundations of Security and Access Control in Computing.- to Identity-Management Models.- Elements of Trust Paradigms in Computing.- Mandatory-Access-Control Model.- Discretionary-Access Control and the Access-Matrix Model.- The Take-Grant Protection... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptographic Security Architecture Presents a novel design that allows for a great deal of customization, which many current methods fail to include; Details a flexible, comprehensive design that can be easily extended when necessary; Proven results: the... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Informatics Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism,... RRP: $184.00 Add to Cart The item has been added