Products

Product categories

Filters

Filters

Clear all
19391 products
Sort by
Sort by
Secure Routing in Multihop Wireless Networks: Provable Security of Routing Protocols in Wireless Ad hoc and Sensor Networks,Used Secure Routing in Multihop Wireless Networks: Provable Security of Routing Protocols in Wireless Ad hoc and Sensor Networks,Used
Add to wishlist
Quick view
Add to compare
Secure Routing in Multihop Wireless Networks: Provable Security of Routing...
Routing is a fundamental networking function in every communication system, and multihop wireless networks are no exceptions. Attacking the routing service, an adversary can easily...
Sale price$82.28 Regular price$117.54
Quantity
Add to cart
SECURE VIDEO COMPRESSION: VIDEO ENCRYPTION,Used SECURE VIDEO COMPRESSION: VIDEO ENCRYPTION,Used
Add to wishlist
Quick view
Add to compare
SECURE VIDEO COMPRESSION: VIDEO ENCRYPTION,Used
INFORMATION EXCHANGE VIA WIRELESS CHANNELS IS INCREASING NOWADAYS.THE DATA TRANSMITTED IS IN THE FORM OF TEXT AND MULTIMEDIA CONTENT AS AUDIO,VIDEO AND IMAGES.AS THE TRANSMISSION...
Sale price$87.34 Regular price$124.77
Quantity
Add to cart
SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET: AN APPROACH TOWARDS MAKING THE ROUTING PROTOCOLS SECURED,Used SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET: AN APPROACH TOWARDS MAKING THE ROUTING PROTOCOLS SECURED,Used
Add to wishlist
Quick view
Add to compare
SECURING FSR PROTOCOL AGAINST DATA PACKET DROPPING IN MANET: AN...
Mobile Ad Hoc Network (MANET) is an emerging area of research in the communication network world. As the MANET is infrastructure less, it is having...
Sale price$79.75 Regular price$113.93
Quantity
Add to cart
Securing MANET with an Enhanced Trust Calculation Method: A Novel Approach for Securing Mobile Ad hoc Network with an Enhanced T,Used Securing MANET with an Enhanced Trust Calculation Method: A Novel Approach for Securing Mobile Ad hoc Network with an Enhanced T,Used
Add to wishlist
Quick view
Add to compare
Securing MANET with an Enhanced Trust Calculation Method: A Novel...
In mobile ad hoc network (MANET) where security is a crucial issue, trust plays an important factor that could improve the number of successful data...
Sale price$81.01 Regular price$115.73
Quantity
Add to cart
Securing Mobile Payments: Modelling, Design, and Analysis: Discovering a new way to perform secure payment transactions over wir,Used Securing Mobile Payments: Modelling, Design, and Analysis: Discovering a new way to perform secure payment transactions over wir,Used
Add to wishlist
Quick view
Add to compare
Securing Mobile Payments: Modelling, Design, and Analysis: Discovering a new...
The content of this book is brought from a PhD Thesis titled "Modelling, Design, and Analysis of Secure Mobile Payment Systems" at Monash University, Australia....
Sale price$124.05 Regular price$177.21
Quantity
Add to cart
Securing MultiMedia Transmission over Mobile Communications Channels: Efficient Multimedia InCompression Encryption Technique,Used Securing MultiMedia Transmission over Mobile Communications Channels: Efficient Multimedia InCompression Encryption Technique,Used
Add to wishlist
Quick view
Add to compare
Securing MultiMedia Transmission over Mobile Communications Channels: Efficient Multimedia InCompression...
Multimedia is one of the most popular data transmitted over mobile and wireless communication channels. Image encryption is often achieved by using one of three...
Sale price$124.05 Regular price$177.21
Quantity
Add to cart
Securing of maritime claims: Arrest of ships in Norway and Ukraine and Rule B Attachment,Used Securing of maritime claims: Arrest of ships in Norway and Ukraine and Rule B Attachment,Used
Add to wishlist
Quick view
Add to compare
Securing of maritime claims: Arrest of ships in Norway and...
In this work an overview of specific possibilities to secure a maritime claim available to claimants from all over the world, based on the legal...
Sale price$78.48 Regular price$112.11
Quantity
Add to cart
Securing the Public Wireless Network,Used Securing the Public Wireless Network,Used
Add to wishlist
Quick view
Add to compare
Securing the Public Wireless Network,Used
Broadband access to the Internet is an economic and social necessity in this information age, resulting in a high demand for access from the general...
Sale price$83.54 Regular price$119.34
Quantity
Add to cart
Securing WBAODV Routing Protocol in MANETs: Towards Efficient and Secure Routing Protocol,Used Securing WBAODV Routing Protocol in MANETs: Towards Efficient and Secure Routing Protocol,Used
Add to wishlist
Quick view
Add to compare
Securing WBAODV Routing Protocol in MANETs: Towards Efficient and Secure...
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or...
Sale price$84.81 Regular price$121.16
Quantity
Add to cart
Securing WSN with Lightweight ResourceEfficient Schemes: Security From the Bootstrapping Phase,Used Securing WSN with Lightweight ResourceEfficient Schemes: Security From the Bootstrapping Phase,Used
Add to wishlist
Quick view
Add to compare
Securing WSN with Lightweight ResourceEfficient Schemes: Security From the Bootstrapping...
Security in wireless sensor network (WSN) encompasses a great number of challenges; ranging from the nature of wireless communications, constrained resources of the sensors, unknown...
Sale price$86.08 Regular price$122.97
Quantity
Add to cart
Securitization of Real Estate Receivables in Brazil: Assessing the Feasibility of a Secondary Market,Used Securitization of Real Estate Receivables in Brazil: Assessing the Feasibility of a Secondary Market,Used
Add to wishlist
Quick view
Add to compare
Securitization of Real Estate Receivables in Brazil: Assessing the Feasibility...
Real estate lending has reached unprecedented levels in Brazil, in part due to the countrys stabilityoriented economic policies adopted over the past decade. Mortgages are...
Sale price$86.08 Regular price$122.97
Quantity
Add to cart
Security analysis & Portfolio Management: Investment Guide,Used Security analysis & Portfolio Management: Investment Guide,Used
Add to wishlist
Quick view
Add to compare
Security analysis & Portfolio Management: Investment Guide,Used
This book is well organized, lucidly written text deals with the basic concepts of investment in securities such as bonds and stocks ,and management of...
Sale price$79.75 Regular price$113.93
Quantity
Add to cart
Security Aware Routing protocol for MANET: Overview of an Asymmetric cryptography with help of public key and private key,Used Security Aware Routing protocol for MANET: Overview of an Asymmetric cryptography with help of public key and private key,Used
Add to wishlist
Quick view
Add to compare
Security Aware Routing protocol for MANET: Overview of an Asymmetric...
An ad hoc network is a collection of autonomous mobile nodes to forming an instant multihop radio infrastructureless network in a dynamic topology. Many routing...
Sale price$78.48 Regular price$112.11
Quantity
Add to cart
Security control brought back to the user: A Semantic Webbased approach to enforcing security in a userfriendly way,Used Security control brought back to the user: A Semantic Webbased approach to enforcing security in a userfriendly way,Used
Add to wishlist
Quick view
Add to compare
Security control brought back to the user: A Semantic Webbased...
The more you want, the more you have to pay for it. In the context of Computer Science this often means, the more control the...
Sale price$97.47 Regular price$139.24
Quantity
Add to cart
Security Enhancement using Dynamic Cache on DSR Based MANETS: An Approach to identify caching problem in wireless networks,Used Security Enhancement using Dynamic Cache on DSR Based MANETS: An Approach to identify caching problem in wireless networks,Used
Add to wishlist
Quick view
Add to compare
Security Enhancement using Dynamic Cache on DSR Based MANETS: An...
The book provides a layout of how caching can be used for effective communication in case of wireless networks. Also a new algorithm was derived...
Sale price$81.01 Regular price$115.73
Quantity
Add to cart
Security Implications of Cloud computing: This manuscript includes an introduction to cloud computing, its security issues and s,Used Security Implications of Cloud computing: This manuscript includes an introduction to cloud computing, its security issues and s,Used
Add to wishlist
Quick view
Add to compare
Security Implications of Cloud computing: This manuscript includes an introduction...
Cloud computing is the latest technological breakthrough in the information technology arena and every enterprise wants to take advantage of it to significantly reduce their...
Sale price$79.75 Regular price$113.93
Quantity
Add to cart

Recently viewed products