You're in Computer Books
Narrow Search Results
Best Seller | PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Web Applications and Social Networking provides a unique in-depth look at how to secure mobile users as customer-facing information... more | $67.00 $31.93 FREE shipping go to store |
In recent years the emerging field of agent technologies has become mainstream in Web engineering. With constant field developments and updates a reference source is needed that reflects the increased scope of agent technology application domains and... more | FREE shipping go to store |
In this book the author provides a fresh algebraic look at the theory of locally decodable codes and private information retrieval schemes. The author s related thesis won the ACM Dissertation Award in 2007 and this book includes some expanded sections. more | FREE shipping go to store |
Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitioners with backgrounds in physics mathematics cryptography coding theory and processor theory. more | FREE shipping go to store |
The application of data warehousing and data mining techniques to computer security is an important emerging area as information processing and internet accessibility costs decline and more and more organizations become vulnerable to cyber attacks.... more | $105.34 $91.43 FREE shipping go to store |
Security protocols are widely used to ensure secure communications over insecure networks such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However using cryptography... more | $69.31 $61.16 FREE shipping go to store |
Despite solid advances numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to... more | FREE shipping go to store |
CONDITION – USED: Books sold are in GOOD or better condition. Good Condition: Minimal damage to the cover dust jacket may not be included minimal wear to binding most of the pages undamaged(e.g. minimal creases or tears) highlighting / underlining... more | FREE shipping go to store |
Information Security and Optimization (Hardcover) Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and... more | $161.50 $124.00 FREE shipping go to store |
2021 International Conference on Security and Information Technologies with Ai Internet Computing and Big-Data Applications more | $249.99 $230.73 go to store |
This book aims to discuss in depth the current state of research and practice in database security. It documents progress and provides researchers and students with a broad perspective of recent developments in what is recognised as a key topic in... more | FREE shipping go to store |
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past sometimes together with IFIP security conference sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to... more | $136.71 $88.31 FREE shipping go to store |
Introduction to Machine Learning With Applications in Information Security more | $59.59 $47.61 FREE shipping go to store |
Handbook of Research on Intelligent Data Processing and Information Security Systems (Hardcover) Intelligent technologies have emerged as imperative tools in computer science and information security. However advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as... more | go to store |
In today s information age the security of digital communication and transactions is of critical importance. Cryptography is the traditional yet effective practice of concealing personal information in cyberspace. Applied Cryptography for Cyber... more | FREE shipping go to store |
Cybercrime and Information Technology: Theory and Practice-The Computer Network Infostructure and Computer Security Cybersecurity Laws Internet of Things (IoT) and Mobile Devices is an introductory text addressing current technology trends and security... more | FREE shipping go to store |
This timely book provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. It has a strong focus on information processing and combines and extends results from the hot... more | $169.99 $108.69 FREE shipping go to store |
This book shows how machine learning (ML) methods can be used to enhance cyber security operations including detection modeling monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML... more | go to store |
Advances in Information Security: Blockchain for Cybersecurity in Cyber-Physical Systems (Hardcover) This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the... more | $133.98 $115.46 go to store |
Advances in Information Security: Artificial Intelligence for Cybersecurity (Hardcover) This book explores new and novel applications of machine learning deep learning and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets... more | $122.28 $115.46 go to store |
Modern Cryptography: Applied Mathematics for Encryption and Information Security (Hardcover) This expanded textbook now in its second edition is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout... more | $47.89 $40.53 go to store |
Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs) the 3D Web Immersive Environments (e.g. MMORPGs) and Virtual Worlds in both scholarly and popular publications very little is written... more | $221.64 $185.66 FREE shipping go to store |
Information Retrieval: A Feature-Centric View of Information Retrieval (Hardcover) Commercial Web search engines such as Google Yahoo and Bing are used every day by millions of people across the globe. With their ever-growing refinement and usage it has become increasingly difficult for academic researchers to keep up with the... more | FREE shipping go to store |
9781597499514. Pre-Owned: Good condition. Trade paperback. Language: English. Pages: 273. Trade paperback (US). Glued binding. 273 p. Contains: Unspecified Illustrations black & white Tables black & white Figures. How can an information security... more | FREE shipping go to store |
Web Services: Concepts Methodologies Tools and Applications VOL 2 (Hardcover) Web Services: Concepts Methodologies Tools and Applications VOL 2 more | FREE shipping go to store |
2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced [1]. The most common cause ofthose vulnerabilities isthe insu?cient input validation. Any data originated... more | $74.99 $52.98 FREE shipping go to store |
Cloud Security: Concepts Methodologies Tools and Applications VOL 3 (Hardcover) Cloud Security: Concepts Methodologies Tools and Applications VOL 3 more | $388.93 $256.87 FREE shipping go to store |
Pre-Owned Security Strategies in Web Applications and Social Networking 9780763791957 PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Web Applications and Social Networking provides a unique in-depth look at how to secure mobile users as customer-facing information... more | FREE shipping go to store |
As consumer costs for multimedia devices such as digital cameras and Web phones have decreased and diversity in the market has skyrocketed the amount of digital information has grown considerably. Intelligent Multimedia Databases and Information... more | FREE shipping go to store |
Numerical Algorithms for Personalized Search in Self-Organizing Information Networks (Hardcover) This book lays out the theoretical groundwork for personalized search and reputation management both on the Web and in peer-to-peer and social networks. Representing much of the foundational research in this field the book develops scalable algorithms... more | $70.91 $55.70 FREE shipping go to store |
Analysis and Comparison of Swarm Intelligence Algorithm in IoT: A Survey.- Implementing Client-Side Encryption for Enforcing Data Privacy on the Web using Symmetric Cryptography.- System to Analyze Electricity Consumption Using IoT and On-Demand Cloud... more | FREE shipping go to store |
The Knowledge Seeker is a useful system to develop various intelligent applications such as ontology-based search engine ontology-based text classification system ontological agent system and semantic web system etc. The Knowledge Seeker contains four... more | $98.99 $94.31 FREE shipping go to store |
The highly successful security book returns with a new edition completely updated Web applications are the front door to most organizations exposing them to attacks that may disclose personal information execute fraudulent transactions or compromise... more | $19.88 $15.23 FREE shipping go to store |
Pre-Owned Web Commerce Security : Design and Development 9780470624463 A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether its online banking or ordering merchandise using your cell phone the world of... more | FREE shipping go to store |
Internet and Web Application Security (Paperback) Internet and Web Application Security Third Edition provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by industry... more | FREE shipping go to store |
Handbook of Research on Text and Web Mining Technologies (Hardcover) The massive daily overflow of electronic data to information seekers creates the need for better ways to digest and organize this information to make it understandable and useful. Text mining a variation of data mining extracts desired information from... more | FREE shipping go to store |
Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web (Hardcover) Communications and personal information that are posted online are usually accessible to a vast number of people. Yet when personal data exist online they may be searched reproduced and mined by advertisers merchants service providers or even stalkers.... more | $107.81 $56.14 FREE shipping go to store |
The Semantic Web has evolved as a blueprint for a knowledge-based framework aimed at crossing the chasm from the current Web of unstructured information resources to a Web equipped with metadata and oriented to delegating tasks to software agents.... more | FREE shipping go to store |
Ads related to web and information security hardcover