Add Wish List Add to Cart The item has been added Spot-On Encryption Suite Spot-On Encryption Suite is a secure instant chat messenger and encrypting e-mail client that also includes additional features such as group chat, file transfer, and a URL search based on an implemented URL data-base, which can be peer-to-peer connected... RRP: $49.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Metaverso y NFT Dos manuscritos en un libro:El metaverso para principiantes: La guía definitiva para entender e invertir en la web 3.0, los NFT, los criptojuegos y la realidad virtualNFT para Principiantes: Una Guía Esencial para Comprender e Invertir en Tokens No... RRP: $59.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Quantum Nonlinear Function Obfuscation Theory and Application This book summarizes the main research results and preliminaries of quantum obfuscation and systematically introduces quantum obfuscation methods. Quantum obfuscation is an important and cross-cutting research topic in quantum cryptography and... RRP: $324.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cyber Resilience System Engineering Empowered by Endogenous Security and Safety This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically expounds the principle of cyberspace endogenous security and safety, introduces the author-invented dynamic heterogeneous redundant (DHR)... RRP: $375.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cybersecurity and Privacy Law Introduction LOCKIN your organization's COMPLIANCE! KNOW THE LAWThis is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice:Know what laws apply: Navigate... RRP: $56.00 Add to Cart The item has been added
sale Add Wish List Add to Cart The item has been added Cybersecurity Simplified In today's interconnected world, cybersecurity is no longer optional-it's a necessity. Cybersecurity Simplified offers a clear and comprehensive guide to understanding the complexities of cybersecurity, tailored for those new to the field. Whether you're... RRP: $31.89 $31.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Ich hacke Technik Ich bin das, was man als Hacker bezeichnet. Knapp 50 Jahre alt und suche in der letzten Hälfte meines Arbeitslebens nochmal einen so richtig coolen Job. Aber leider reißen sich die Arbeitgeber um mich. Für den Job, den ich seit 20 Jahren mache,... RRP: $53.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Chaos-based Cryptography Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such... RRP: $442.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - ASIACRYPT 2010 ASIACRYPT 2010 was held in the Swissˆ otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and... RRP: $206.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added High Performance Networking, Computing, Communication Systems, and Mathematical Foundations The 2009 International Conference on High-Performance Networking, Computing and Communication Systems and the 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science (ICHCC -ICTMF 2009)... RRP: $154.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Distibuted Computing and Networking RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Financial Cryptography and Data Security. FC 2024 International Workshops This book constitutes the proceedings of the workshops that have been held in conjunction with the 28th International Conference on Financial Cryptography, FC 2024, which took place in Willemstad, Curaçao, during March 4-8, 2024. The total of... RRP: $119.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Quantum Computing SHA256 Are you ready to uncover the future of cryptography and Bitcoin mining in the age of quantum computing?This groundbreaking book, Quantum Computing SHA256: Complete Oracle Implementation for Grover's Algorithm, delivers the first fully implemented,... RRP: $139.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Optical Coding Theory with Prime Dedicated to optical coding theory, this unique book covers fundamental concepts and important developments, with a focus on families of prime codes, supplemented with several families of non-prime codes. It also explores potential applications to... RRP: $487.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Iris Biometric Model for Secured Network Access This book proposes a new model-the IrisCryptoAgentSystem (ICAS)-based on a biometric method for authentication using the iris of the eye. It explains how to use MAS to solve security problems in complex systems and demonstrates how the intersection of... RRP: $373.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added ManusCrypt A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed around the needs, biases, flaws and skills of humans. RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Offensive and Defensive Cyber Security Strategies The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The CISO Playbook The CISO Playbook aims to provide nothing but real world advice and perspectives to both up and coming cybersecurity leaders as well existing ones looking to grow. RRP: $118.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The Art of Cyber Defense The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. RRP: $282.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Data Privacy Management and Autonomous Spontaneus Security This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptography and Security This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added The LLL Algorithm Computational aspects of geometry of numbers have been revolutionized by the Lenstra-Lenstra-Lovasz ´ lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and... RRP: $250.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Digital Video and Audio Broadcasting Technology "Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide" deals with all the most important digital television, sound radio and multimedia standards such as MPEG, DVB, DVD, DAB, ATSC, T-DMB, DMB-T, DRM... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Security Technology As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Future Generation Information Technology As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Crytology - ASIACRYPT 2009 ASIACRYPT 2009,the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo,Japan,during December 6-10, 2009. The conference was sponsored by the International - sociation for... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Trust Management III ThisvolumecontainstheproceedingsofIFIPTM2009,theThirdIFIPWG11.11 International Conference on Trust Management, held at Purdue University in West Lafayette, Indiana, USA during June 15-19, 2009. IFIPTM 2009 provided a truly... RRP: $238.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Security Technology As security technology (ST) becomes specialized and fragmented, it is easy to lose sight that many topics in ST have common threads and because of this, advances in one sub-discipline may transmit to another. The presentation... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Protecting Persons While Protecting the People The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Public-Key Cryptography Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Emerging Challenges for Security, Privacy and Trust It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Formal Aspects in Security and Trust The present volume contains the proceedings of the 5th International Workshop on Formal Aspects in Security and Trust (FAST 2008), held in Malaga, Spain, October 9-10, 2008. FAST is an event a?liated with the 13th European Sym-... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Progress in Cryptology - INDOCRYPT 2008 This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Autonomic and Trusted Computing ThisvolumecontainstheproceedingsofATC2008,the5thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Oslo, Norway,d- ing June... RRP: $184.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Transactions on Data Hiding and Multimedia Security III Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography,... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added New Stream Cipher Designs Thequestion"Streamciphers:deadoralive?"wasposedbyAdiShamir.Intended to provokedebate,the questioncouldnot havebeen better, ormorestarkly,put. However,itwasnotShamir'sintentiontosuggestthatstreamciphersthemselves were obsolete;... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Progress in Cryptology - Africacrypt 2008 The AFRICACRYPT 2008 conference was held during June 11-14, 2008 in Casablanca, Morocco. Upon the initiative of the organizers from the Ecole n- male sup´ erieure in Casablanca, this event was the ?rst international research... RRP: $92.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - ASIACRYPT'99 Asiacrypt'99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt'99, the ?fth annual Asiacrypt conference, was sponsored by the Asiacrypt Steering... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Cryptographic Hardware and Embedded Systems These are the proceedings of CHES'99, the rst workshop on Cryptographic Hardware and Embedded Systems. As it becomes more obvious that strong security will be an important part of the next generation of communication, computer,... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Secure Networking - CQRE (Secure) '99 The CQRE [Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes. The unprecedented reliance on computer technology has... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added State of the Art in Applied Cryptography The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - CRYPTO '98 This book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO'98, held in Santa Barbara, California, USA, in August 1998. The book presents 33 revised full papers selected from a... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added LATIN'98 This book constitutes the refereed proceedings of the Third Latin American Symposium on Theoretical Informatics, LATIN'98, held in Campinas, Brazil, in April 1998.The 28 revised full papers presented together with five invited... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Advances in Cryptology - CRYPTO 2002 Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the... RRP: $220.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Computer Security -- ESORICS 2002 ESORICS, the European Symposium on Research in Computer Security, is the leading research-oriented conference on the theory and practice of computer security in Europe. It takes place every two years, at various locations... RRP: $116.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Infrastructure Security Infrastructure Security Conference 2002 (InfraSec 2002) was created to promote security research and the development of practical solutions in the security of infrastructures - both government and commercial - such as the... RRP: $122.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Protocols for Authentication and Key Establishment Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can... RRP: $227.00 Add to Cart The item has been added
Add Wish List Add to Cart The item has been added Topics in Cryptology - CT-RSA 2002 This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer... RRP: $116.00 Add to Cart The item has been added