As software systems become increasingly ubiquitous, the issues of dependability become more and more crucial. Given that solutions to these …
As software systems become increasingly ubiquitous, issues of dependability become ever more crucial. Given that solutions to these issues must …
Biometrics: Personal Identification in Networked Society is a comprehensive and accessible source of state-of-the-art information on all existing and emerging …
This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization …
This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, the …
Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have …
Unlock the full power of Microsoft Azure for creating, deploying, and managing applications. Quickly get up to speed with foundational …
A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX Overview A complete administration companion …
Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second Edition develops the theory of elliptic curves to provide …
William Stallings Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with …
Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network …
Cryptography is an outstanding book that covers all the major areas of cryptography in a readable, mathematically precise form. Several …
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, …
PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, …
Proceedings of the 4th Intl Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, held February 12-14, 2002 …
This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, …
This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC …
This book constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, PKC …
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, …
Dont waste your time building an application server. See how to build low-cost, low-maintenance, highly available, serverless single page web …
Learn to design, build, and manage your infrastructure on the most popular of all the Cloud platforms―Amazon Web ServicesAbout This …
This self-study guide delivers 100% coverage of all topics on the new CCSP exam This highly effective test preparation guide …
Cloud Computing: Concepts, Technology, Security & ArchitectureCloud computing has become an integral and foundational part of information technology. The majority …
An updated, revised, and comprehensive overview of the concepts related to cloud computing, including recent applications, innovations, and its future …
The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will …
Understand the fundamentals of security, compliance, and identity solutions across Microsoft Azure, Microsoft 365, and related cloud-based Microsoft services Key …
The United States launched a new Free and Open Indo-Pacific (FOIP) strategy in late 2017 after reluctantly concluding that its …
Major enterprises and small start-ups are beginning to embrace cloud computing for the scalability and reliability that cloud vendors can …
Cloud Computing A Practical Approach for Learning and Implementation
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking …
Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and …
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what …
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical …
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction …
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer …
This book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical …