Computer security Books

Sidebar Sidebar Sidebar
  • Algorithms for Data and Computation Privacy Algorithms for Data and Computation Privacy
    Add to Cart The item has been added

    Algorithms for Data and Computation Privacy

    This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for...
    $238.00

    Add to Cart The item has been added
  • Security and Cryptography for Networks Security and Cryptography for Networks
    Add to Cart The item has been added

    Security and Cryptography for Networks

    This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.The 33 papers presented in this volume were carefully reviewed and selected from 87...
    $227.00

    Add to Cart The item has been added
  • Artificial Intelligence and Security Artificial Intelligence and Security
    Add to Cart The item has been added

    Artificial Intelligence and Security

    This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called...
    $227.00

    Add to Cart The item has been added
  • Advances in Cryptology - CRYPTO 2020 Advances in Cryptology - CRYPTO 2020
    Add to Cart The item has been added

    Advances in Cryptology - CRYPTO 2020

    Conference on Cryptologic Research, CRYPTO 2020, which was held during August 17-21, 2020. Crypto has traditionally been held at UCSB every year, but due to the COVID-19 pandemic it will be an online event in 2020.The 85 papers presented in the...
    $184.00

    Add to Cart The item has been added
  • Advances in Digital Forensics XVI Advances in Digital Forensics XVI
    Add to Cart The item has been added

    Advances in Digital Forensics XVI

    Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital...
    $220.00

    Add to Cart The item has been added
  • Information Security and Privacy Information Security and Privacy
    Add to Cart The item has been added

    Information Security and Privacy

    This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully...
    $227.00

    Add to Cart The item has been added
  • Building Decentralized Trust Building Decentralized Trust
    Add to Cart The item has been added

    Building Decentralized Trust

    This volume brings together a multidisciplinary group of scholars from diverse fields including computer science, engineering, archival science, law, business, psychology, economics, medicine and more to discuss the trade-offs between different...
    $216.00

    Add to Cart The item has been added
  • Build Your Own Blockchain Build Your Own Blockchain
    Add to Cart The item has been added

    Build Your Own Blockchain

    This book provides a comprehensive introduction to blockchain and distributed ledger technology. Intended as an applied guide for hands-on practitioners, the book includes detailed examples and in-depth explanations of how to build and run a blockchain...
    $108.00

    Add to Cart The item has been added
  • Redesigning Wiretapping Redesigning Wiretapping
    Add to Cart The item has been added

    Redesigning Wiretapping

    This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11.It pays particular attention to the 1990s, which marked one of the most dramatic...
    $249.00

    Add to Cart The item has been added
  • Blockchain Cybersecurity, Trust and Privacy Blockchain Cybersecurity, Trust and Privacy
    Add to Cart The item has been added

    Blockchain Cybersecurity, Trust and Privacy

    ​This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P...
    $281.00

    Add to Cart The item has been added
  • Cloud Security Auditing Cloud Security Auditing
    Add to Cart The item has been added

    Cloud Security Auditing

    This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties...
    $216.00

    Add to Cart The item has been added
  • ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
    Add to Cart The item has been added

    ICT Systems Security and Privacy Protection

    This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2019, held in Lisbon, Portugal, in June 2019.The 26 revised full papers presented were carefully reviewed...
    $184.00

    Add to Cart The item has been added
  • Advances in Human Factors in Cybersecurity Advances in Human Factors in Cybersecurity
    Add to Cart The item has been added

    Advances in Human Factors in Cybersecurity

    This book reports on the latest research and developments in the field of cybersecurity, particularly focusing on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing...
    $270.00

    Add to Cart The item has been added
  • Cybersecurity in the Electricity Sector Cybersecurity in the Electricity Sector
    Add to Cart The item has been added

    Cybersecurity in the Electricity Sector

    This book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions. The author explains the current state of cybersecurity in the...
    $270.00

    Add to Cart The item has been added
  • Advances in Cyber Security Analytics and Decision Systems Advances in Cyber Security Analytics and Decision Systems
    Add to Cart The item has been added

    Advances in Cyber Security Analytics and Decision Systems

    This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of...
    $335.00

    Add to Cart The item has been added
  • Advances in Cryptology - EUROCRYPT 2019 Advances in Cryptology - EUROCRYPT 2019
    Add to Cart The item has been added

    Advances in Cryptology - EUROCRYPT 2019

    The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May...
    $220.00

    Add to Cart The item has been added
  • Cybersecurity and Secure Information Systems Cybersecurity and Secure Information Systems
    Add to Cart The item has been added

    Cybersecurity and Secure Information Systems

    This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and...
    $184.00

    Add to Cart The item has been added
  • Smart Systems for E-Health Smart Systems for E-Health
    Add to Cart The item has been added

    Smart Systems for E-Health

    The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies...
    $281.00

    Add to Cart The item has been added
  • Ubiquitous Computing and Computing Security of IoT Ubiquitous Computing and Computing Security of IoT
    Add to Cart The item has been added

    Ubiquitous Computing and Computing Security of IoT

    This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense...
    $184.00

    Add to Cart The item has been added
  • Electronic Postage Systems Electronic Postage Systems
    Add to Cart The item has been added

    Electronic Postage Systems

    This book offers the first comprehensive overview of contemporary systems for secure electronic/digital postage. It introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The underlying cryptographic...
    $227.00

    Add to Cart The item has been added
  • Zero Trust Security Zero Trust Security
    Add to Cart The item has been added

    Zero Trust Security

    Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute...
    $81.00

    Add to Cart The item has been added
  • Advanced DPA Theory and Practice Advanced DPA Theory and Practice
    Add to Cart The item has been added

    Advanced DPA Theory and Practice

    Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book...
    $227.00

    Add to Cart The item has been added
  • Structured Peer-to-Peer Systems Structured Peer-to-Peer Systems
    Add to Cart The item has been added

    Structured Peer-to-Peer Systems

    The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and...
    $227.00

    Add to Cart The item has been added
  • Moving Target Defense II Moving Target Defense II
    Add to Cart The item has been added

    Moving Target Defense II

    Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class...
    $220.00

    Add to Cart The item has been added
  • Security and Privacy in Social Networks Security and Privacy in Social Networks
    Add to Cart The item has been added

    Security and Privacy in Social Networks

    Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In...
    $184.00

    Add to Cart The item has been added
  • Spyware and Adware Spyware and Adware
    Add to Cart The item has been added

    Spyware and Adware

    Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the...
    $184.00

    Add to Cart The item has been added
  • Security and Privacy for Implantable Medical Devices Security and Privacy for Implantable Medical Devices
    Add to Cart The item has been added

    Security and Privacy for Implantable Medical Devices

    This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD). It describes in detail new issues termed as lightweight security, due to the...
    $184.00

    Add to Cart The item has been added
  • E-Commerce Security and Privacy E-Commerce Security and Privacy
    Add to Cart The item has been added

    E-Commerce Security and Privacy

    Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information...
    $227.00

    Add to Cart The item has been added
  • Recent Advances in RSA Cryptography Recent Advances in RSA Cryptography
    Add to Cart The item has been added

    Recent Advances in RSA Cryptography

    Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA...
    $227.00

    Add to Cart The item has been added
  • Applications of Data Mining in Computer Security Applications of Data Mining in Computer Security
    Add to Cart The item has been added

    Applications of Data Mining in Computer Security

    Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or...
    $184.00

    Add to Cart The item has been added
  • Informed Watermarking Informed Watermarking
    Add to Cart The item has been added

    Informed Watermarking

    This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in a secure, robust and imperceptible fashion. Digital watermarking as a topic...
    $220.00

    Add to Cart The item has been added
  • Intelligence Management Intelligence Management
    Add to Cart The item has been added

    Intelligence Management

    The current rapid development in both computing power and the ability to present and mine complex data sets in useful ways provides the backdrop to Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime. The...
    $227.00

    Add to Cart The item has been added
  • Identity-Based Encryption Identity-Based Encryption
    Add to Cart The item has been added

    Identity-Based Encryption

    Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work...
    $227.00

    Add to Cart The item has been added
  • Quantum Attacks on Public-Key Cryptosystems Quantum Attacks on Public-Key Cryptosystems
    Add to Cart The item has been added

    Quantum Attacks on Public-Key Cryptosystems

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The...
    $227.00

    Add to Cart The item has been added
  • Preserving Privacy in Data Outsourcing Preserving Privacy in Data Outsourcing
    Add to Cart The item has been added

    Preserving Privacy in Data Outsourcing

    Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties...
    $227.00

    Add to Cart The item has been added
  • Insider Threats in Cyber Security Insider Threats in Cyber Security
    Add to Cart The item has been added

    Insider Threats in Cyber Security

    Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview...
    $184.00

    Add to Cart The item has been added
  • Adaptive Cryptographic Access Control Adaptive Cryptographic Access Control
    Add to Cart The item has been added

    Adaptive Cryptographic Access Control

    Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access...
    $227.00

    Add to Cart The item has been added
  • Access Control Systems Access Control Systems
    Add to Cart The item has been added

    Access Control Systems

    Foundations of Security and Access Control in Computing.- to Identity-Management Models.- Elements of Trust Paradigms in Computing.- Mandatory-Access-Control Model.- Discretionary-Access Control and the Access-Matrix Model.- The Take-Grant Protection...
    $227.00

    Add to Cart The item has been added
  • Cryptographic Security Architecture Cryptographic Security Architecture
    Add to Cart The item has been added

    Cryptographic Security Architecture

    Presents a novel design that allows for a great deal of customization, which many current methods fail to include; Details a flexible, comprehensive design that can be easily extended when necessary; Proven results: the...
    $227.00

    Add to Cart The item has been added
  • Security Informatics Security Informatics
    Add to Cart The item has been added

    Security Informatics

    Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism,...
    $184.00

    Add to Cart The item has been added
Computer security