This book presents the contributions from a workshop entitled 'Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT,'...
Securing Emerging Wireless Systems: Lowerlayer Approaches aims to fill a growing need in the research community for a reference that describes the lowerlayer approaches as...
Secrecy Capacity of Independent Parallel Channels. Obtaining Secrecy through Intentional Uncertainty. Distributed Secret Sharing over the Gaussian Interference Wiretap Channel. Cooperative Jamming: The Tale of...
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September 2010.
This important text/reference presents the latest secure and privacycompliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field,...
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK,...
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy,...
The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The...
This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of...
Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks,...
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including:*Secure Networks...
This book constitutes the thoroughly refereed postconference proceedings of the International Workshop on Interplay of Security, Safety and System/Software Architecture, CSITS 2018, and the International...
Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the...
This volume contains the papers presented at the 2nd International Conference on Se rityinPervasiveComputing(SPC2005)heldApril68,2005inBoppard,Germany.The objective of this second conference was to develop new security concepts...
Jens HETLAND & Teimuraz GOCHITASHVILI In contrast to oil, natural gas is usually routed through pipeline systems stretched from the wellhead to the enduser although...
<div class="dynamic-checkout__content" id="dynamic-checkout-cart" data-shopify="dynamic-checkout-cart"> <shopify-accelerated-checkout-cart wallet-configs="[{"name":"shop_pay","wallet_params":{"shopId":73758048501,"merchantName":"Ergodebooks","personalized":true}},{"name":"amazon_pay","wallet_params":{"checkoutLanguage":"en_US","ledgerCurrency":"USD","placement":"Cart","sandbox":false,"merchantId":"A1G1ZY975O1T6J","productType":"PayAndShip","design":"C0002"}},{"name":"paypal","wallet_params":{"shopId":73758048501,"countryCode":"US","merchantName":"Ergodebooks","phoneRequired":true,"companyRequired":false,"shippingType":"shipping","shopifyPaymentsEnabled":true,"hasManagedSellingPlanState":false,"requiresBillingAgreement":false,"merchantId":"L873BZSC9NMQS","sdkUrl":"https://www.paypal.com/sdk/js?components=buttons\u0026commit=false\u0026currency=USD\u0026locale=en_US\u0026client-id=AbasDhzlU0HbpiStJiN1KRJ_cNJJ7xYBip7JJoMO0GQpLi8ePNgdbLXkC7_KMeyTg8tnAKW4WKrh9qmf\u0026merchant-id=L873BZSC9NMQS\u0026intent=authorize"}}]" access-token="c0f52a66b386e9fa5c0ab4c2febc737c" buyer-country="US" buyer-locale="en" buyer-currency="USD" shop-id="73758048501" cart-id="690429297addca4bc43e5506ea0ca82e" > <div class="wallet-button-wrapper"> <ul class='wallet-cart-grid wallet-cart-grid--skeleton' role="list" data-shopify-buttoncontainer="true"> <li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li> </ul> </div> </shopify-accelerated-checkout-cart> <small id="shopify-buyer-consent" class="hidden" aria-hidden="true" data-consent-type="subscription"> One or more of the items in your cart is a recurring or deferred purchase. By continuing, I agree to the <span id="shopify-subscription-policy-button">cancellation policy</span> and authorize you to charge my payment method at the prices, frequency and dates listed on this page until my order is fulfilled or I cancel, if permitted. </small> </div>
Stay in the know
Subscribe to our newsletter and stay updated on latest offers, discounts and events near you.
For MAP (Minimum Advertised Price) violations, please contact: map@ergode.com
For Intellectual Property (IP) or Trademark concerns, please contact: ip@ergode.com
⚠️ California Proposition 65 Warning: Some products sold on this website may expose you to chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm. For more information, visit www.P65Warnings.ca.gov.
This book presents the contributions from a workshop entitled 'Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT,'...
Securing Emerging Wireless Systems: Lowerlayer Approaches aims to fill a growing need in the research community for a reference that describes the lowerlayer approaches as...
Secrecy Capacity of Independent Parallel Channels. Obtaining Secrecy through Intentional Uncertainty. Distributed Secret Sharing over the Gaussian Interference Wiretap Channel. Cooperative Jamming: The Tale of...
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September 2010.
This important text/reference presents the latest secure and privacycompliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field,...
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK,...
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy,...
The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The...
This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of...
Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks,...
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including:*Secure Networks...
This book constitutes the thoroughly refereed postconference proceedings of the International Workshop on Interplay of Security, Safety and System/Software Architecture, CSITS 2018, and the International...
Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the...
This volume contains the papers presented at the 2nd International Conference on Se rityinPervasiveComputing(SPC2005)heldApril68,2005inBoppard,Germany.The objective of this second conference was to develop new security concepts...
Jens HETLAND & Teimuraz GOCHITASHVILI In contrast to oil, natural gas is usually routed through pipeline systems stretched from the wellhead to the enduser although...
Sale price$116.89Regular price$166.99
Quantity
Add to cart
Choosing a selection results in a full page refresh.