Products

Product categories

Filters

Filters

Clear all
21705 products
Sort by
Sort by
Sold out
Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Elec,Used Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Elec,Used
Add to wishlist
Quick view
Add to compare
Securing Electricity Supply in the Cyber Age: Exploring the Risks...
This book presents the contributions from a workshop entitled 'Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT,'...
Sale price$116.18 Regular price$165.97
Quantity
Add to cart
New
Securing Emerging Wireless Systems: Lowerlayer Approaches,Used Securing Emerging Wireless Systems: Lowerlayer Approaches,Used
Add to wishlist
Quick view
Add to compare
Securing Emerging Wireless Systems: Lowerlayer Approaches,Used
Securing Emerging Wireless Systems: Lowerlayer Approaches aims to fill a growing need in the research community for a reference that describes the lowerlayer approaches as...
Sale price$149.51 Regular price$213.59
Quantity
Add to cart
Securing Wireless Communications at the Physical Layer,Used Securing Wireless Communications at the Physical Layer,Used
Add to wishlist
Quick view
Add to compare
Securing Wireless Communications at the Physical Layer,Used
Secrecy Capacity of Independent Parallel Channels. Obtaining Secrecy through Intentional Uncertainty. Distributed Secret Sharing over the Gaussian Interference Wiretap Channel. Cooperative Jamming: The Tale of...
Sale price$200.42 Regular price$286.31
Quantity
Add to cart
Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 1315, 2010, Proceeding,Used Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 1315, 2010, Proceeding,Used
Add to wishlist
Quick view
Add to compare
Security and Cryptography for Networks: 7th International Conference, SCN 2010,...
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September 2010.
Sale price$87.49 Regular price$124.99
Quantity
Add to cart
New
Security and Privacy in Biometrics,Used Security and Privacy in Biometrics,Used
Add to wishlist
Quick view
Add to compare
Security and Privacy in Biometrics,Used
This important text/reference presents the latest secure and privacycompliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field,...
Sale price$60.11 Regular price$85.87
Quantity
Add to cart
Sold out
Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, September 79, 2011,,Used Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, September 79, 2011,,Used
Add to wishlist
Quick view
Add to compare
Security and Privacy in Communication Networks: 7th International ICST Conference,...
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK,...
Sale price$24.25 Regular price$36.38
Quantity
Add to cart
Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 35,,Used Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 35,,Used
Add to wishlist
Quick view
Add to compare
Security and Privacy in Communication Networks: 8th International ICST Conference,...
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy,...
Sale price$80.36 Regular price$114.80
Quantity
Add to cart
Security and Privacy in Digital Rights Management: ACM CCS8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised,Used Security and Privacy in Digital Rights Management: ACM CCS8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised,Used
Add to wishlist
Quick view
Add to compare
Security and Privacy in Digital Rights Management: ACM CCS8 Workshop...
The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The...
Sale price$69.80 Regular price$99.71
Quantity
Add to cart
Security and Privacy in Smart Grid (SpringerBriefs in Electrical and Computer Engineering),Used Security and Privacy in Smart Grid (SpringerBriefs in Electrical and Computer Engineering),Used
Add to wishlist
Quick view
Add to compare
Security and Privacy in Smart Grid (SpringerBriefs in Electrical and...
This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of...
Sale price$69.05 Regular price$98.64
Quantity
Add to cart
Security and Privacy in Social Networks,Used Security and Privacy in Social Networks,Used
Add to wishlist
Quick view
Add to compare
Security and Privacy in Social Networks,Used
Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks,...
Sale price$20.04 Regular price$28.63
Quantity
Add to cart
Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26,Used Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26,Used
Add to wishlist
Quick view
Add to compare
Security and Privacy in the Age of Uncertainty: IFIP TC11...
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including:*Secure Networks...
Sale price$111.61 Regular price$159.44
Quantity
Add to cart
Security and Safety Interplay of Intelligent Software Systems: ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, B,Used Security and Safety Interplay of Intelligent Software Systems: ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, B,Used
Add to wishlist
Quick view
Add to compare
Security and Safety Interplay of Intelligent Software Systems: ESORICS 2018...
This book constitutes the thoroughly refereed postconference proceedings of the International Workshop on Interplay of Security, Safety and System/Software Architecture, CSITS 2018, and the International...
Sale price$64.33 Regular price$91.90
Quantity
Add to cart
Security for Telecommunications Networks (Advances in Information Security, 40),Used Security for Telecommunications Networks (Advances in Information Security, 40),Used
Add to wishlist
Quick view
Add to compare
Security for Telecommunications Networks (Advances in Information Security, 40),Used
Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the...
Sale price$7.94 Regular price$11.34
Quantity
Add to cart
Sold out
Security in an Interconnected World: A Strategic Vision for Defence Policy (Research for Policy),Used Security in an Interconnected World: A Strategic Vision for Defence Policy (Research for Policy),Used
Add to wishlist
Quick view
Add to compare
Security in an Interconnected World: A Strategic Vision for Defence...
This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces...
Sale price$72.51 Regular price$103.59
Quantity
Add to cart
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 68, 2005, Proceedings (Lect,Used Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 68, 2005, Proceedings (Lect,Used
Add to wishlist
Quick view
Add to compare
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard,...
This volume contains the papers presented at the 2nd International Conference on Se rityinPervasiveComputing(SPC2005)heldApril68,2005inBoppard,Germany.The objective of this second conference was to develop new security concepts...
Sale price$70.87 Regular price$101.24
Quantity
Add to cart
Sold out
Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry, 149),Used Security of Natural Gas Supply through Transit Countries (NATO Science Series II: Mathematics, Physics and Chemistry, 149),Used
Add to wishlist
Quick view
Add to compare
Security of Natural Gas Supply through Transit Countries (NATO Science...
Jens HETLAND & Teimuraz GOCHITASHVILI In contrast to oil, natural gas is usually routed through pipeline systems stretched from the wellhead to the enduser although...
Sale price$116.89 Regular price$166.99
Quantity
Add to cart

Recently viewed products