You're in Computer Books
Narrow Search Results
Best Seller | Information Security Theory and Practice. Security Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th Ifip Wg 11.2 International Workshop Wistp 2012 Egham Uk June 20-22 2012 Proceedings more | FREE shipping go to store |
Sharing of location data enables numerous exciting applications such as location-based queries location-based social recommendations monitoring of traffic and air pollution levels etc. Disclosing exact user locations raises serious privacy concerns as... more | go to store |
This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data SocialSec 2019 held in Copenhagen Denmark in July 2019. The 18 full papers and 3 short papers presented in... more | FREE shipping go to store |
This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection SEC 2022 held in Copenhagen Denmark in June 2022. The 29 full papers presented were carefully reviewed and... more | $119.99 $101.74 go to store |
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces schools private residences and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets data ransom system and... more | $55.00 $48.75 FREE shipping go to store |
Synthesis Lectures on Information Security Privacy and Tru: Automated Software Diversity (Paperback) Whereas user-facing applications are often written in modern languages the firmware operating system support libraries and virtual machines that underpin just about any modern computer system are still written in low-level languages that value... more | $34.99 $29.87 FREE shipping go to store |
This book contains selected papers presented at the 16th IFIP WG 9.2 9.6/11.7 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management held online in August 2021. The 9 full papers included in this volume were carefully reviewed... more | $99.99 $88.50 go to store |
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication. Reversible watermarking is a class of (fragile) digital watermarking that not only authenticates... more | go to store |
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy ACISP 2022 held in Wollongong NSW Australia in November 2022.The 25 full papers presented were carefully revised and selected from 62... more | go to store |
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy ACISP 2013 held in Brisbane Australia in July 2013. The 28 revised full papers presented were carefully selected from 78... more | $74.99 $54.99 FREE shipping go to store |
In this book we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks fuzzy systems multi-agent systems genetic algorithms image analysis clustering etc) which are applied to the protection of privacy and... more | FREE shipping go to store |
Human Aspects of Information Security Privacy and Trust: First International Conference Has 2013 Held as Part of Hci International 2013 Las Vegas Nv Usa July 21-26 2013. Proceedings more | $76.92 $53.66 FREE shipping go to store |
This volume contains the proceedings of the IFIPTM 2008 the Joint iTrust and PST Conferences on Privacy Trust Management and Security held in Trondheim Norway from June 18 to June 20 2008. IFIPTM 2008 provides a truly global platform for the reporting... more | FREE shipping go to store |
This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy ACISP 2003 held in Wollongong Australia in July 2003. The 42 revised full papers presented together with 3 invited contributions were... more | $139.00 $54.99 FREE shipping go to store |
This book constitutes the refereed proceedings of the Second International Conference ICSP 2021 held in Jamshedpur India in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in... more | FREE shipping go to store |
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy ACISP 2017 held in Auckland New Zealand in July 2017. The 45 revised full papers 2 keynotes 8 invited... more | $84.99 $54.99 FREE shipping go to store |
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New... more | FREE shipping go to store |
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet information hiding addresses two areas of concern: privacy of information from... more | $99.99 $88.69 FREE shipping go to store |
This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication WISTP 2013 held in Heraklion Crete Greece in... more | $74.99 $52.92 FREE shipping go to store |
Security and privacy are paramount concerns in information processing systems which are vital to business government and military operations and indeed society itself. Meanwhile the expansion of the Internet and its convergence with telecommunication... more | $175.00 $133.26 FREE shipping go to store |
Information Security (Paperback) Information security protects sensitive information from unauthorized activities including inspection modification recording and any disruption or destruction. The goal is to ensure the safety and privacy of critical data such as customer account... more | go to store |
Security and privacy are paramount concerns in information processing systems which are vital to business government and military operations and indeed society itself. Meanwhile the expansion of the Internet and its convergence with telecommunication... more | $173.36 $151.54 FREE shipping go to store |
Pre-Owned Encyclopedia of Information Ethics and Security 9781591409878 Used Presents a comprehensive reference source on ethical and security issues relating to technologies. This title includes topics such as computer crime information warfare privacy surveillance intellectual property and education. CONDITION – USED: Books... more | $18.64 $4.93 FREE shipping go to store |
Web and Information Security (Hardcover) Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular security for the semantic Web privacy... more | FREE shipping go to store |
This book covers cybersecurity privacy and control methods and technologies integrated with blockchain and multimedia AI including encryption and watermarking techniques wearable-based IoT security methods multimedia data forensics and video monitoring. more | $150.00 $115.35 FREE shipping go to store |
Car-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic information. Thereby security and privacy are regarded as an... more | $107.81 $52.39 FREE shipping go to store |
Advanced Security and Privacy for RFID Technologies (Hardcover) While there are many positive aspects in which RFID devices are useful there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with its... more | FREE shipping go to store |
Machine Learning in Cyber Trust: Security Privacy and Reliability (Paperback) Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning corrupt important data or expose private information. Not surprisingly the field of cyber-based systems is a fertile ground where many tasks can... more | FREE shipping go to store |
As Information Technology becomes a vital part of our everyday activities ranging from personal use to government and defense applications the need to develop high-assurance systems increases. Data and applications security and privacy are crucial... more | FREE shipping go to store |
This book constitutes revised selected papers from two VLDB workshops: The International Workshop on Polystore Systems for Heterogeneous Data in Multiple Databases with Privacy and Security Assurances Poly 2022 and the 8th International Workshop on... more | go to store |
An Improved version of AODV Protocol For Mobile Networks (Paperback) Communication privacy is becoming an essential security requirement for mission critical communications and communication infrastructure protection. Wireless networking is an emerging technology that allows users to access information and services... more | FREE shipping go to store |
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!Access control protects resources against unauthorized viewing tampering or destruction. They serve as a primary means of ensuring privacy confidentiality and... more | FREE shipping go to store |
Access Control Authentication and Public Key Infrastructure 9780763791285 Used / Pre-owned PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!Access control protects resources against unauthorized viewing tampering or destruction. They serve as a primary means of ensuring privacy confidentiality and... more | FREE shipping go to store |
Ads related to healthcare information security and privacy