Coding theory and cryptology Books

Sidebar Sidebar Sidebar
  • Spot-On Encryption Suite Spot-On Encryption Suite
    Add to Cart The item has been added

    Spot-On Encryption Suite

    Spot-On Encryption Suite is a secure instant chat messenger and encrypting e-mail client that also includes additional features such as group chat, file transfer, and a URL search based on an implemented URL data-base, which can be peer-to-peer connected...
    $49.00

    Add to Cart The item has been added
  • Metaverso y NFT Metaverso y NFT
    Add to Cart The item has been added

    Metaverso y NFT

    Dos manuscritos en un libro:El metaverso para principiantes: La guía definitiva para entender e invertir en la web 3.0, los NFT, los criptojuegos y la realidad virtualNFT para Principiantes: Una Guía Esencial para Comprender e Invertir en Tokens No...
    $59.00

    Add to Cart The item has been added
  • Cybersecurity and Privacy Law Introduction Cybersecurity and Privacy Law Introduction
    Add to Cart The item has been added

    Cybersecurity and Privacy Law Introduction

    LOCKIN your organization's COMPLIANCE! KNOW THE LAWThis is an introduction to the cybersecurity and privacy laws that you need to know. This indispensable resource is tailored for those who deal with IT and legal practice:Know what laws apply: Navigate...
    $56.00

    Add to Cart The item has been added
  • sale
    Cybersecurity Simplified Cybersecurity Simplified
    Add to Cart The item has been added

    Cybersecurity Simplified

    In today's interconnected world, cybersecurity is no longer optional-it's a necessity. Cybersecurity Simplified offers a clear and comprehensive guide to understanding the complexities of cybersecurity, tailored for those new to the field. Whether you're...
    RRP: $31.89
    $31.00

    Add to Cart The item has been added
  • Ich hacke Technik Ich hacke Technik
    Add to Cart The item has been added

    Ich hacke Technik

    Ich bin das, was man als Hacker bezeichnet. Knapp 50 Jahre alt und suche in der letzten Hälfte meines Arbeitslebens nochmal einen so richtig coolen Job. Aber leider reißen sich die Arbeitgeber um mich. Für den Job, den ich seit 20 Jahren mache,...
    $53.00

    Add to Cart The item has been added
  • Chaos-based Cryptography Chaos-based Cryptography
    Add to Cart The item has been added

    Chaos-based Cryptography

    Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such...
    $442.00

    Add to Cart The item has been added
  • Advances in Cryptology - ASIACRYPT 2010
    Add to Cart The item has been added

    Advances in Cryptology - ASIACRYPT 2010

    ASIACRYPT 2010 was held in the Swissˆ otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and...
    $206.00

    Add to Cart The item has been added
  • Quantum Computing SHA256 Quantum Computing SHA256
    Add to Cart The item has been added

    Quantum Computing SHA256

    Are you ready to uncover the future of cryptography and Bitcoin mining in the age of quantum computing?This groundbreaking book, Quantum Computing SHA256: Complete Oracle Implementation for Grover's Algorithm, delivers the first fully implemented,...
    $139.00

    Add to Cart The item has been added
  • Optical Coding Theory with Prime Optical Coding Theory with Prime
    Add to Cart The item has been added

    Optical Coding Theory with Prime

    Dedicated to optical coding theory, this unique book covers fundamental concepts and important developments, with a focus on families of prime codes, supplemented with several families of non-prime codes. It also explores potential applications to...
    $487.00

    Add to Cart The item has been added
  • Iris Biometric Model for Secured Network Access Iris Biometric Model for Secured Network Access
    Add to Cart The item has been added

    Iris Biometric Model for Secured Network Access

    This book proposes a new model-the IrisCryptoAgentSystem (ICAS)-based on a biometric method for authentication using the iris of the eye. It explains how to use MAS to solve security problems in complex systems and demonstrates how the intersection of...
    $373.00

    Add to Cart The item has been added
  • ManusCrypt ManusCrypt
    Add to Cart The item has been added

    ManusCrypt

    A very much practicable solution has been presented with a real-world use-case scenario; wherein infosec is designed around the needs, biases, flaws and skills of humans.
    $282.00

    Add to Cart The item has been added
  • Image coming soon
    Add to Cart The item has been added

    The CISO Playbook

    The CISO Playbook aims to provide nothing but real world advice and perspectives to both up and coming cybersecurity leaders as well existing ones looking to grow.
    $118.00

    Add to Cart The item has been added
  • The Art of Cyber Defense The Art of Cyber Defense
    Add to Cart The item has been added

    The Art of Cyber Defense

    The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
    $282.00

    Add to Cart The item has been added
  • Cryptography and Security Cryptography and Security
    Add to Cart The item has been added

    Cryptography and Security

    This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his...
    $122.00

    Add to Cart The item has been added
  • The LLL Algorithm The LLL Algorithm
    Add to Cart The item has been added

    The LLL Algorithm

    Computational aspects of geometry of numbers have been revolutionized by the Lenstra-Lenstra-Lovasz ´ lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and...
    $250.00

    Add to Cart The item has been added
  • Digital Video and Audio Broadcasting Technology Digital Video and Audio Broadcasting Technology
    Add to Cart The item has been added

    Digital Video and Audio Broadcasting Technology

    "Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide" deals with all the most important digital television, sound radio and multimedia standards such as MPEG, DVB, DVD, DAB, ATSC, T-DMB, DMB-T, DRM...
    $238.00

    Add to Cart The item has been added
  • Security Technology Security Technology
    Add to Cart The item has been added

    Security Technology

    As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to...
    $92.00

    Add to Cart The item has been added
  • Future Generation Information Technology Future Generation Information Technology
    Add to Cart The item has been added

    Future Generation Information Technology

    As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to...
    $122.00

    Add to Cart The item has been added
  • Advances in Crytology - ASIACRYPT 2009 Advances in Crytology - ASIACRYPT 2009
    Add to Cart The item has been added

    Advances in Crytology - ASIACRYPT 2009

    ASIACRYPT 2009,the 15th InternationalConferenceon the TheoryandApp- cationof Cryptologyand InformationSecurity washeld in Tokyo,Japan,during December 6-10, 2009. The conference was sponsored by the International - sociation for...
    $116.00

    Add to Cart The item has been added
  • Trust Management III Trust Management III
    Add to Cart The item has been added

    Trust Management III

    ThisvolumecontainstheproceedingsofIFIPTM2009,theThirdIFIPWG11.11 International Conference on Trust Management, held at Purdue University in West Lafayette, Indiana, USA during June 15-19, 2009. IFIPTM 2009 provided a truly...
    $238.00

    Add to Cart The item has been added
  • Advances in Security Technology Advances in Security Technology
    Add to Cart The item has been added

    Advances in Security Technology

    As security technology (ST) becomes specialized and fragmented, it is easy to lose sight that many topics in ST have common threads and because of this, advances in one sub-discipline may transmit to another. The presentation...
    $92.00

    Add to Cart The item has been added
  • Protecting Persons While Protecting the People Protecting Persons While Protecting the People
    Add to Cart The item has been added

    Protecting Persons While Protecting the People

    The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May...
    $92.00

    Add to Cart The item has been added
  • Public-Key Cryptography Public-Key Cryptography
    Add to Cart The item has been added

    Public-Key Cryptography

    Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of...
    $116.00

    Add to Cart The item has been added
  • Emerging Challenges for Security, Privacy and Trust Emerging Challenges for Security, Privacy and Trust
    Add to Cart The item has been added

    Emerging Challenges for Security, Privacy and Trust

    It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009...
    $227.00

    Add to Cart The item has been added
  • Formal Aspects in Security and Trust Formal Aspects in Security and Trust
    Add to Cart The item has been added

    Formal Aspects in Security and Trust

    The present volume contains the proceedings of the 5th International Workshop on Formal Aspects in Security and Trust (FAST 2008), held in Malaga, Spain, October 9-10, 2008. FAST is an event a?liated with the 13th European Sym-...
    $122.00

    Add to Cart The item has been added
  • Progress in Cryptology - INDOCRYPT 2008 Progress in Cryptology - INDOCRYPT 2008
    Add to Cart The item has been added

    Progress in Cryptology - INDOCRYPT 2008

    This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and...
    $122.00

    Add to Cart The item has been added
  • Autonomic and Trusted Computing Autonomic and Trusted Computing
    Add to Cart The item has been added

    Autonomic and Trusted Computing

    ThisvolumecontainstheproceedingsofATC2008,the5thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Oslo, Norway,d- ing June...
    $184.00

    Add to Cart The item has been added
  • New Stream Cipher Designs New Stream Cipher Designs
    Add to Cart The item has been added

    New Stream Cipher Designs

    Thequestion"Streamciphers:deadoralive?"wasposedbyAdiShamir.Intended to provokedebate,the questioncouldnot havebeen better, ormorestarkly,put. However,itwasnotShamir'sintentiontosuggestthatstreamciphersthemselves were obsolete;...
    $122.00

    Add to Cart The item has been added
  • Progress in Cryptology - Africacrypt 2008 Progress in Cryptology - Africacrypt 2008
    Add to Cart The item has been added

    Progress in Cryptology - Africacrypt 2008

    The AFRICACRYPT 2008 conference was held during June 11-14, 2008 in Casablanca, Morocco. Upon the initiative of the organizers from the Ecole n- male sup´ erieure in Casablanca, this event was the ?rst international research...
    $92.00

    Add to Cart The item has been added
  • Advances in Cryptology - ASIACRYPT'99 Advances in Cryptology - ASIACRYPT'99
    Add to Cart The item has been added

    Advances in Cryptology - ASIACRYPT'99

    Asiacrypt'99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt'99, the ?fth annual Asiacrypt conference, was sponsored by the Asiacrypt Steering...
    $122.00

    Add to Cart The item has been added
  • Cryptographic Hardware and Embedded Systems Cryptographic Hardware and Embedded Systems
    Add to Cart The item has been added

    Cryptographic Hardware and Embedded Systems

    These are the proceedings of CHES'99, the rst workshop on Cryptographic Hardware and Embedded Systems. As it becomes more obvious that strong security will be an important part of the next generation of communication, computer,...
    $116.00

    Add to Cart The item has been added
  • Secure Networking - CQRE (Secure) '99 Secure Networking - CQRE (Secure) '99
    Add to Cart The item has been added

    Secure Networking - CQRE (Secure) '99

    The CQRE [Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes. The unprecedented reliance on computer technology has...
    $122.00

    Add to Cart The item has been added
  • State of the Art in Applied Cryptography State of the Art in Applied Cryptography
    Add to Cart The item has been added

    State of the Art in Applied Cryptography

    The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in...
    $122.00

    Add to Cart The item has been added
  • Advances in Cryptology - CRYPTO '98 Advances in Cryptology - CRYPTO '98
    Add to Cart The item has been added

    Advances in Cryptology - CRYPTO '98

    This book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO'98, held in Santa Barbara, California, USA, in August 1998. The book presents 33 revised full papers selected from a...
    $116.00

    Add to Cart The item has been added
  • LATIN'98 LATIN'98
    Add to Cart The item has been added

    LATIN'98

    This book constitutes the refereed proceedings of the Third Latin American Symposium on Theoretical Informatics, LATIN'98, held in Campinas, Brazil, in April 1998.The 28 revised full papers presented together with five invited...
    $122.00

    Add to Cart The item has been added
  • Advances in Cryptology - CRYPTO 2002 Advances in Cryptology - CRYPTO 2002
    Add to Cart The item has been added

    Advances in Cryptology - CRYPTO 2002

    Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the...
    $220.00

    Add to Cart The item has been added
  • Computer Security -- ESORICS 2002 Computer Security -- ESORICS 2002
    Add to Cart The item has been added

    Computer Security -- ESORICS 2002

    ESORICS, the European Symposium on Research in Computer Security, is the leading research-oriented conference on the theory and practice of computer security in Europe. It takes place every two years, at various locations...
    $116.00

    Add to Cart The item has been added
  • Infrastructure Security Infrastructure Security
    Add to Cart The item has been added

    Infrastructure Security

    Infrastructure Security Conference 2002 (InfraSec 2002) was created to promote security research and the development of practical solutions in the security of infrastructures - both government and commercial - such as the...
    $122.00

    Add to Cart The item has been added
  • Protocols for Authentication and Key Establishment Protocols for Authentication and Key Establishment
    Add to Cart The item has been added

    Protocols for Authentication and Key Establishment

    Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can...
    $227.00

    Add to Cart The item has been added
  • Topics in Cryptology - CT-RSA 2002 Topics in Cryptology - CT-RSA 2002
    Add to Cart The item has been added

    Topics in Cryptology - CT-RSA 2002

    This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer...
    $116.00

    Add to Cart The item has been added
Coding theory and cryptology