1-80
of
4,218
results
-
Applied Cryptography for Cyber...In today s information age the security of digital communication and transacti... In today s information age the security of digital communication and transactions is of critical importance. Cryptography is the traditional yet effective practice of concealing personal information in cyberspace. Applied Cryptography for Cyber... more
-
Pre-Owned Cyber Security Crypt...This book constitutes the refereed proceedings of the Fourth International Sym... This book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning CSCML 2020 held in Be er Sheva Israel in July 2020. The 12 full and 4 short papers presented in this volume were... more
-
Pre-Owned Cyber Security Crypt...This book constitutes the refereed proceedings of the Second International Sym... This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning CSCML 2018 held in Beer-Sheva Israel in June 2018. The 16 full and 6 short papers presented in this volume were... more
-
Communications in Computer and...This book constitutes the refereed First International Conference on Cryptogra... This book constitutes the refereed First International Conference on Cryptography Codes and Cyber Security I4CS 2022 held in Casablanca Morocco during October 27-28 2022. The 4 full papers and 3 invited papers presented in this book were carefully... more
-
Iconic Arts Laminated 24x24 in...Iconic Arts Laminated 24x24 inches Poster: Cyber Security Internet Hacker Netw... Iconic Arts Laminated 24x24 inches Poster: Cyber Security Internet Hacker Network Technology Secure Protect Access Spyware Privacy Hacking Protection Cyber Security Cyber Crime. HIGH QUALITY ART PRINT is ready-to-frame or can be hung on the wall... more
-
Pre-Owned Advances in Cyber Se...CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in... CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in the field this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers scientists students and... more
-
Advances in Cyber Security: Cy...CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in... CYBER SECURITY AND NETWORK SECURITY Written and edited by a team of experts in the field this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers scientists students and... more
-
Handbook of Research on Machin...As the advancement of technology continues cyber security continues to play a ... As the advancement of technology continues cyber security continues to play a significant role in today s world. With society becoming more dependent on the internet new opportunities for virtual attacks can lead to the exposure of critical... more
-
Advances in Information Securi...Motivation for the Book This book seeks to establish the state of the art in t... Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security cognitive science and... more
-
Communications in Computer and...This book sonstitutes selected papers from the first International Conference ... This book sonstitutes selected papers from the first International Conference on Cyber Warfare Security and Space Research SpacSec 2021 held in Jaipur India in December 2021. The 19 full and 6 short papers were thoroughly reviewed and selected from... more
-
Pre-Owned Chapman & Hall/CRC C...Now the most used texbook for introductory cryptography courses in both mathem... Now the most used texbook for introductory cryptography courses in both mathematics and computer science the Third Edition builds upon previous editions by offering several new sections topics and exercises. The authors present the core principles... more
-
Pre-Owned Information Security...In this introductory textbook the author explains the key topics in cryptograp... In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach where defining what is meant by secure is as important as creating something that achieves that goal and security definitions are central to... more
-
Pre-Owned Chapman & Hall/CRC C...The Handbook of Financial Cryptography and Security elucidates the theory and ... The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic... more
-
Pre-Owned Lecture Notes in Com...The Department of Electrical Engineering-ESAT at the Katholieke Universiteit L... The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983 the second in 1989... more
-
Pre-Owned Information Security...Locally computable (NC0) functions are simple functions for which every bit of... Locally computable (NC0) functions are simple functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions... more
-
Pre-Owned Information Security...The first part of this book covers the key concepts of cryptography on an unde... The first part of this book covers the key concepts of cryptography on an undergraduate level from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange user identification... more
-
Advanced Sciences and Technolo...Deals with collaborative security a newly developing and promising field. Desc... Deals with collaborative security a newly developing and promising field. Describes generic techniques as well as their applications in several domains that are naturally described as cyber-physical systems Contributes to identifing relevant... more
-
Pre-Owned Advanced Sciences an...Deals with collaborative security a newly developing and promising field. Desc... Deals with collaborative security a newly developing and promising field. Describes generic techniques as well as their applications in several domains that are naturally described as cyber-physical systems Contributes to identifing relevant... more
-
Pre-Owned Establishing Cyber S...As society continues to heavily rely on software and databases the risks for c... As society continues to heavily rely on software and databases the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments there is a need for cybersecurity... more
-
Pre-Owned Digital Security: Cy...Good Condition: Minimal damage to the cover dust jacket may not be included mi... Good Condition: Minimal damage to the cover dust jacket may not be included minimal wear to binding most of the pages undamaged(e.g. minimal creases or tears) highlighting / underlining acceptable on books as long as the text is readable and... more
-
Pre-Owned Communications in Co...This book constitutes the thoroughly refereed selected papers on the Second Cy... This book constitutes the thoroughly refereed selected papers on the Second Cyber Security and Privacy EU Forum CSP 2014 held in Athens Greece in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90... more
-
Pre-Owned Communications in Co...This book constitutes the thoroughly refereed selected papers on the 4th Cyber... This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum CSP Forum 2015 held in Brussels Belgium in April 2015. The 12 revised full papers presented were carefully reviewed and selected... more
-
Pre-Owned Communications in Co...This book constitutes the thoroughly refereed selected papers on Cyber Securit... This book constitutes the thoroughly refereed selected papers on Cyber Security and Privacy EU Forum 2013 held in Belgium in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers... more
-
Cyber Ecosystem and Security M...This comprehensive book offers valuable insights while using a wealth of examp... This comprehensive book offers valuable insights while using a wealth of examples and illustrations to effectively demonstrate the principles algorithms challenges and applications of machine learning and data mining for computer and cyber security. more
-
Pre-Owned Cyber Ecosystem and ...While Computer Security is a broader term which incorporates technologies prot... While Computer Security is a broader term which incorporates technologies protocols standards and policies to ensure the security of the computing systems including the computer hardware software and the information stored in it Cyber Security is a... more
-
Pre-Owned Synthesis Lectures o...This book deals with crypto-biometrics a relatively new and multi-disciplinary... This book deals with crypto-biometrics a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages such as revocability template diversity better verification... more
-
Cyber Security Cyber Crime and...Recent developments in cyber security crime and forensics have attracted resea... Recent developments in cyber security crime and forensics have attracted researcher and practitioner interests from technological organizational and policy-making perspectives. Technological advances address challenges in information sharing... more
-
Pre-Owned Chapman & Hall/CRC C...Developed from the authors courses at Syracuse University and the U.S. Air For... Developed from the authors courses at Syracuse University and the U.S. Air Force Research Laboratory Access Control Security and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security... more
-
Pre-Owned Glossary of Cyber Wa...There has always been some degree of controversy surrounding computers and com... There has always been some degree of controversy surrounding computers and computers have always been vulnerable. In the early days of computing there were cases of theft and criminal damage to new computer installations. Computers have been shot at... more
-
Children Cyber Behavior and Cy...This book is written keeping in mind the majority of parents who may not be te... This book is written keeping in mind the majority of parents who may not be technical savvy and may need awareness as well as easy tips to handle the current children cyber behavior. We have included actual images to visualize and understand the... more
-
Chapman & Hall/CRC Cryptograph...Helping current and future system designers take a more productive approach in... Helping current and future system designers take a more productive approach in the field Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and... more
-
Pre-Owned Chapman & Hall/CRC C...Helping current and future system designers take a more productive approach in... Helping current and future system designers take a more productive approach in the field Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and... more
-
Information Security and Crypt...Security protocols are widely used to ensure secure communications over insecu... Security protocols are widely used to ensure secure communications over insecure networks such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However using... more
-
To implement a Multi-level Sec...Master s Thesis from the year 2014 in the subject Computer Science - IT-Securi... Master s Thesis from the year 2014 in the subject Computer Science - IT-Security Lovely Professional University Punjab course: M.Tech (Computer Science and Engineering) language: English abstract: Currently cloud computing environments have come up... more
-
Information Security and Crypt...Hardware-intrinsic security is a young field dealing with secure secret key st... Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitioners with backgrounds in physics mathematics cryptography coding theory and processor theory. more
-
Information Security and Crypt...The Tamarin prover is an open-source analysis tool for cryptographic protocols... The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol possible adversaries and the desired security properties Tamarin either verifies the protocol or provides counter examples witnessing... more
-
Pre-Owned Information Security...This book provides a concise yet comprehensive overview of computer and Intern... This book provides a concise yet comprehensive overview of computer and Internet security suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a... more
-
Information Security and Crypt...This book provides a concise yet comprehensive overview of computer and Intern... This book provides a concise yet comprehensive overview of computer and Internet security suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a... more
-
Pre-Owned Communications in Co...This book constitutes the refereed proceedings of the 7th Security Research Co... This book constitutes the refereed proceedings of the 7th Security Research Conference Future Security 2012 held in Bonn Germany in September 2012. The 78 revised full papers presented were carefully reviewed and selected from 137 submissions. The... more
-
Chapman & Hall/CRC Cyber-Physi...This book discusses a range of topics from information security to cryptograph... This book discusses a range of topics from information security to cryptography mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the... more
-
-
Information Security (Wiley): ...The only book to provide a unified view of the interplay between computational... The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security.... more
-
Pre-Owned Financial Cryptograp...This book contains the revised selected papers of the Second Workshop on Real-... This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization RLCPS 2011 and the Second Workshop on Ethics in Computer Security Research WECSR 2011 held in conjunction with the 15th... more
-
River Publishers Digital Secur...This book has recipes and tool development expertise and describe projects in ... This book has recipes and tool development expertise and describe projects in malware analysis web application security intrusion detection system and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown... more
-
Pre-Owned Information Security...This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 Inter... This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication WISTP 2013 held in Heraklion Crete Greece... more
-
Advances in Information Securi...The application of data warehousing and data mining techniques to computer sec... The application of data warehousing and data mining techniques to computer security is an important emerging area as information processing and internet accessibility costs decline and more and more organizations become vulnerable to cyber attacks.... more
-
Pre-Owned Cyber Security on Az...Prevent destructive attacks to your Azure public cloud infrastructure remove v... Prevent destructive attacks to your Azure public cloud infrastructure remove vulnerabilities and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider s perspective. Cyber Security on Azure... more
-
Security Science and Technolog...Cyber-security is a matter of rapidly growing importance in industry and gover... Cyber-security is a matter of rapidly growing importance in industry and government. This book provides insight into a range of data science techniques for addressing these pressing concerns.The application of statistical and broader data science... more
-
Pre-Owned Advances in Informat...Cyber-Security of Scada and Other Industrial Control Systems Cyber-Security of Scada and Other Industrial Control Systems more
-
Pre-Owned Security and Digital...The General Data Protection Regulation is the latest and one of the most strin... The General Data Protection Regulation is the latest and one of the most stringent regulations regarding Data Protection to be passed into law by the European Union. Fundamentally it aims to protect the Rights and Freedoms of all the individuals... more
-
Pre-Owned Cyber Ecosystem and ...Cloud computing is an indispensable part of the modern Information and Communi... Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance and promote quickly deployable and scalable IT solutions with reduced... more
-
Mastering Windows Security and...A comprehensive guide to administering and protecting the latest Windows 11 an... A comprehensive guide to administering and protecting the latest Windows 11 and Windows Server 2022 from the complex cyber threats Key Features Learn to protect your Windows environment using zero-trust and a multi-layered security approach... more
-
Pre-Owned Cyber Security on Az...Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Secur... Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security ISBN-10 1484265300 ISBN-13 9781484265307 Copeland; Marshall; Jacobs; Matthew 2nd ed. edition 296 pages Apress Binding: Paperback more
-
Cyber Ecosystem and Security C...Cloud computing is an indispensable part of the modern Information and Communi... Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance and promote quickly deployable and scalable IT solutions with reduced... more
-
Pre-Owned Security Science and...Cyber-security is a matter of rapidly growing importance in industry and gover... Cyber-security is a matter of rapidly growing importance in industry and government. This book provides insight into a range of data science techniques for addressing these pressing concerns.The application of statistical and broader data science... more
-
Lecture Notes in Computer Scie...The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th ... The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security FC 2024 which took place in Willemstad Curaçao during March 4-8 2024. The number of 36 full and 6... more
-
Pre-Owned Security and Cryptog...The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was h... The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori Italy on September 6-8 2006. The conference was the ?fth in the SCN series and this year marked a change in its name (the former name was Security in... more
-
Pre-Owned Security Privacy and...This book constitutes the refereed proceedings of the 11th International Confe... This book constitutes the refereed proceedings of the 11th International Conference on Security Privacy and Applied Cryptography Engineering SPACE 2021 held in Kolkata India in December 2021. The 13 full papers presented were carefully reviewed and... more
-
Pre-Owned Lightweight Cryptogr...This book constitutes the refereed post-conference proceedings of the Third In... This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy LightSec 2014 held in Istanbul Turkey in September 2014. The 10 full papers presented were... more
-
Cryptography and Network Secur...Starting with the historical facts behind the concept of information which led... Starting with the historical facts behind the concept of information which led to the creation of computer networks Internet of things and cryptocurrencies the book then arrives at the main definitions of cryptography and network security the... more
-
Pre-Owned Security for Wireles...Security for Wireless Sensor Networks using Identity-Based Cryptography introd... Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security--detailing its... more
-
Pre-Owned IEEE Press Informati...Public Key Cryptography: Applications and Attacks Public Key Cryptography: Applications and Attacks more
-
Pre-Owned Applied Cryptography...Applied Cryptography and Network Security: 12th International Conference Acns ... Applied Cryptography and Network Security: 12th International Conference Acns 2014 Lausanne Switzerland June 10-13 2014. Proceedings more
-
Pre-Owned Cryptography and Dat...CONDITION – USED: Books sold are in GOOD or better condition. Good Condition... CONDITION – USED: Books sold are in GOOD or better condition. Good Condition: Minimal damage to the cover dust jacket may not be included minimal wear to binding most of the pages undamaged(e.g. minimal creases or tears) highlighting / underlining... more
-
Pre-Owned Security and Cryptog...Security and Cryptography for Networks: 9th International Conference Scn 2014 ... Security and Cryptography for Networks: 9th International Conference Scn 2014 Amalfi Italy September 3-5 2014. Proceedings more
-
Nomenclatura - Encyclopedia of...This Encyclopedia of modern Cryptography and Internet Security brings the late... This Encyclopedia of modern Cryptography and Internet Security brings the latest and most relevant coverage of the topic - expanding a lot of relevant terms and central key words: It s a Nomenclatura! # Fundamental information on modern Cryptography... more
-
Pre-Owned Cryptography and Net...The Principles and Practice of Cryptography and Network Security Stallings Cry... The Principles and Practice of Cryptography and Network Security Stallings Cryptography and Network Security Seventh Edition introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and... more
-
Pre-Owned Financial Cryptograp...This book constitutes the thoroughly refereed post-conference proceedings of t... This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013) held at Bankoku Shinryokan Busena Terrace Beach Resort Okinawa Japan April 1-5 2013.... more
-
Pre-Owned Network Security and...9781683928836. Pre-Owned: Good condition. Trade paperback. 2nd ed. Language: E... 9781683928836. Pre-Owned: Good condition. Trade paperback. 2nd ed. Language: English. Pages: 584. Trade paperback (US). Glued binding. 584 p. This new edition introduces the basic concepts in computer networks blockchain and the latest trends and... more
-
Pre-Owned Financial Cryptograp...Financial Cryptography and Data Security: 18th International Conference FC 201... Financial Cryptography and Data Security: 18th International Conference FC 2014 Christ Church Barbados March 3-7 2014 Revised Selected Papers more
-
Pre-Owned Cryptography and Net...Our books are pre-loved which means they have been read before. We carefully c... Our books are pre-loved which means they have been read before. We carefully check all our books and believe them to be in a - USED - VERY GOOD Condition condition. If you re not completely satisfied please get in touch & we ll be happy to help.... more
-
Cryptography And Its Applicati...Cryptography And Its Applications In Information Security Cryptography And Its Applications In Information Security more
-
Pre-Owned Cryptography and Net...Our books are pre-loved which means they have been read before. We carefully c... Our books are pre-loved which means they have been read before. We carefully check all our books and believe them to be in acceptable condition. If you re not completely satisfied please get in touch & we ll be happy to help. ISBN-10: 0072870222... more
-
Pre-Owned Applied Cryptography...The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th ... The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security ACNS 2021 which took place virtually during June 21-24 2021. The 37 full papers presented in the... more
-
Pre-Owned Security Privacy and...This book constitutes the refereed proceedings of the 8th International Confer... This book constitutes the refereed proceedings of the 8th International Conference on Security Privacy and Applied Cryptography Engineering SPACE 2018 held in Kanpur India in December 2018. The 12 full papers presented were carefully reviewed and... more
-
Pre-Owned Financial Cryptograp...This book constitutes the thoroughly refereed post-conference proceedings of t... This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Conference on Financial Cryptography and Data Security FC 2018 held in Nieuwport Curaçao in February/ March 2018. The 27 revised full papers and 2... more
-
Pre-Owned Financial Cryptograp...This book constitutes the thoroughly refereed post-conference proceedings of t... This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security FC 2017 held in Sliema Malta in April 2017. The 30 revised full papers and 5 short papers were... more
-
Pre-Owned Security and Cryptog...This book constitutes the proceedings of the 11th International Conference on ... This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks SCN 2018 held in Amalfi Italy in September 2018. The 30 papers presented in this volume were carefully reviewed and selected from 66... more
-
Advances in Information Securi...Information Systems (IS) are a nearly omnipresent aspect of the modern world p... Information Systems (IS) are a nearly omnipresent aspect of the modern world playing crucial roles in the fields of science and engineering business and law art and culture politics and government and many others. As such identity theft and... more
Ads related to cyber security cryptography research
Shopping for the best deal on Cyber security cryptography research Computer Books - Select a product below or see other matches to read product reviews, compare prices and store ratings.