Electronic Books

Total Books: 21 - 40 /118
978-981-10-6011-3
Complications and Quandaries in the ICT Sector

This book talks about how the regulatory agencies and courts in the United States, European Union and India are dealing with ...

Continue reading
978-3-540-31998-6
Computer Network Security (vol. # 3685)

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...

Continue reading
978-3-540-88313-5
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...

Continue reading
978-3-540-85834-8
Cooperative Information Agents XII : 12th International Workshop, CIA 2008, Prague, Czech Republic, September 10-12, 2008. Proceedings

This book constitutes the refereed proceedings of the 12th International Workshop on Cooperative Information Agents, CIA ...

Continue reading
9789811936661
Corporate fraud across the globe / Larry Li, Adela McMurray

It is expected that uncovered corporate fraud negatively affects the public reputation, and financial performance of fraudulent ...

Continue reading
978-3-540-69084-9
Critical Information Infrastructured Security

This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...

Continue reading
978-3-540-31940-5
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

Continue reading
978-3-540-32298-6
Cryptology and Network Security (vol. # 3810)

Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...

Continue reading
978-3-540-49463-8
Cryptology and Network Security (vol. # 4301)

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...

Continue reading
978-3-540-73538-0
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

Continue reading
978-3-540-73538-0
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

Continue reading
978-3-540-36017-9
Detection of Intrusions and Malware, and Vulnerability Assessment

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...

Continue reading
978-3-540-85204-9
Electronic Government : 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held ...

Continue reading
978-3-540-31680-0
Financial Cryptography and Data Security (vol. # 3570)

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...

Continue reading
978-3-540-75227-1
Formal Aspects in Security and Trust

Thepresentvolumecontainsthepost-proceedingsofthe4thInternationalWo- shop on Formal Aspects in Security and Trust (FAST2006). ...

Continue reading
978-3-540-32629-8
Formal Aspects in Security and Trust (vol. # 3866)

This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security ...

Continue reading
978-3-540-31936-8
Foundations of Security Analysis and Design III

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...

Continue reading
978-3-319-64816-3
Foundations of Trusted Autonomy

This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy ...

Continue reading
978-1-78561-928-1
Frontiers in Hardware Security and Trust: Theory, design and practice

The footprint and power constraints imposed on internet-of-things end-points, smart sensors, mobile and ad hoc network devices ...

Continue reading
978-3-540-34222-9
Global Price Fixing

The book describes and analyzes the formation, operation, and impacts of modern global cartels. It provides a broad picture ...

Continue reading
Total Books: 21 - 40 /118