Skip to main content

Shopping Cart

You're getting the VIP treatment!

Item(s) unavailable for purchase
Please review your cart. You can remove the unavailable item(s) now or we'll automatically remove it at Checkout.
itemsitem
itemsitem

Recommended For You

Loading...

Library & Information Services eBooks

If you like Library & Information Services eBooks, then you'll love these top picks.
Showing 2353 - 2376 of 10343 Results
Skip side bar filters
  • Cryptography for Payment Professionals

    by Ilya Dubinsky ...
    Although cryptography plays an essential part in most modern solutions, especially in payments, cryptographic algorithms remain a black box for most users of these tools. Just as a sane backend developer does not drill down into low-level disk access details of a server filesystem, payments professionals have enough things to worry about before they ever need to bother themselves with debugging an ... Read more

    $130.99 USD

  • Cryptography for Secure Encryption

    Series series Universitext
    This text is intended for a one-semester course in cryptography at the advanced undergraduate/Master's degree level. It is suitable for students from various STEM backgrounds, including engineering, mathematics, and computer science, and may also be attractive for researchers and professionals who want to learn the basics of cryptography. Advanced knowledge of computer science or mathematics ... Read more

    $49.99 USD $18.99 USD

  • Cryptography in Constant Parallel Time

    Series series Information Security and Cryptography
    Locally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and ... Read more

    $49.99 USD

  • Cryptography with Shrinking Generators

    Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation

    Series series SpringerBriefs in Mathematics
    This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators. Starting with an overview of cryptography, it describes each type of generator - shrinking, self-shrinking, modified self-shrinking, generalized self-shrinking and the DECIM algorithm - with examples ... Read more

    $53.99 USD

  • Cryptology

    Classical and Modern

    Series series Chapman & Hall/CRC Cryptography and Network Security Series
    Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as ... Read more

    $58.99 USD

  • Cryptology and Error Correction

    An Algebraic Introduction and Real-World Applications

    Series series Springer Undergraduate Texts in Mathematics and Technology
    This text presents a careful introduction to methods of cryptology and error correction in wide use throughout the world and the concepts of abstract algebra and number theory that are essential for understanding these methods. The objective is to provide a thorough understanding of RSA, Diffie–Hellman, and Blum–Goldwasser cryptosystems and Hamming and Reed–Solomon error correction: how they are ... Read more

    $53.99 USD

  • Cryptology and Network Security

    15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings

    Series Book 10052 - Lecture Notes in Computer Science
    This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; ... Read more

    $49.99 USD

  • Cryptology and Network Security

    22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 – November 2, 2023, Proceedings

    Series Book 14342 - Lecture Notes in Computer Science
    This book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections:Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC ... Read more

    $80.99 USD

  • Cryptology and Network Security

    17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings

    Series Book 11124 - Lecture Notes in Computer Science
    This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018.The 26 full papers were carefully reviewed and selected from 79 submissions. The papers are organized in the following topical sections: privacy; Internet misbehavior and protection; malware; symmetric key cryptography; ... Read more

    $80.99 USD $49.99 USD

  • Cryptology and Network Security

    14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings

    Series Book 9476 - Lecture Notes in Computer Science
    This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015.The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based ... Read more

    $49.99 USD

  • Cryptology and Network Security

    19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings

    Series Book 12579 - Lecture Notes in Computer Science
    This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS 2020, held in Vienna, Austria, in December 2020.*The 30 full papers were carefully reviewed and selected from 118 submissions. The papers focus on topics such as cybersecurity; credentials; elliptic curves; payment systems; privacy-enhancing tools; lightweight cryptography; ... Read more

    $89.99 USD

  • Cryptology and Network Security

    16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers

    Series Book 11261 - Lecture Notes in Computer Science
    This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017.The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. The full papers are organized in the following topical sections: foundation of ... Read more

    $49.99 USD

  • Cryptology and Network Security

    20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings

    Series Book 13099 - Lecture Notes in Computer Science
    This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021. The conference was originally planned to take place in Vienna, Austria, and changed to an online event due to the COVID-19 pandemic.The 25 full and 3 short papers presented in these proceedings were carefully reviewed and ... Read more

    $80.99 USD

  • Cryptology and Network Security

    18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings

    Edited by Yi Mu, Robert H. Deng, Xinyi Huang ...
    Series Book 11829 - Lecture Notes in Computer Science
    This book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019.The 21 full papers and 8 short papers were carefully reviewed and selected from 55 submissions. The papers focus on topics such as homomorphic encryption; SIKE and Hash; lattice and post-quantum cryptography; searchable encryption ... Read more

    $80.99 USD $49.99 USD

  • Cryptology and Network Security

    21st International Conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, Proceedings

    Series Book 13641 - Lecture Notes in Computer Science
    This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates.The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections ... Read more

    $67.99 USD

  • Cryptology and Network Security with Machine Learning

    Proceedings of ICCNSML 2022

    Series series Algorithms for Intelligent Systems
    The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, ... Read more

    $215.99 USD

  • Cryptology For Engineers: An Application-oriented Mathematical Introduction

    Cryptology is increasingly becoming one of the most essential topics of interest in everyday life. Digital communication happens by transferring data between at least two participants — But do we want to disclose private information while executing a sensitive bank transfer? How about allowing third-party entities to eavesdrop on private calls while performing an important secret business ... Read more

    $70.99 USD

  • Cryptology Transmitted Message Protection

    From Deterministic Chaos up to Optical Vortices

    Series series Signals and Communication Technology
    This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information ... Read more

    $89.99 USD

  • Créer des services innovants

    Stratégies et répertoire d'actions pour les bibliothèques

    by Collectif ...
    Series series La Boîte à outils
    Confrontés aux multiples évolutions qui animent notre société, les professionnels des bibliothèques doivent travailler à développer un processus permanent de renouvellement de leurs offres de service. Pour cela il faut apprendre à innover, à penser innovation. Peut-on « décréter » l'innovation ? Comment impulser une dynamique d'innovation au sein des équipes ? Comment développer un service ... Read more

    $2.99 USD

  • Créer et gérer un service de référence

    by Collectif ...
    Series series La Boîte à outils
    L’importance accrue de l’information pour nos concitoyens, et la complexité des formes quelle revêt, conduisent les bibliothèques à transformer leurs services. Au-delà de la stricte gestion d’une collection, les bibliothécaires s’attachent à écouter les demandes des utilisateurs et à traiter l’information pour y répondre. Corinne Verry-Jolivet, directrice du Centre d’information scientifique de l ... Read more

    $12.99 USD

  • Créer une maison d'édition

    Series series Edition
    Cet ouvrage est destiné à celles et ceux qui souhaitent créer leur maison d’édition.Thèmes abordés : le choix de la structure juridique, le CFE, la TVA, le référencement sur les bases de données, le catalogue, les manuscrits, la diffusion-distribution, le point mort, le calcul des droits d’auteur, le livre numérique, les hubs littéraires, les obligations de l’éditeur, le contrat, etc.3e édition. ... Read more

    $7.99 USD

  • Cultivating Civility

    Practical Ways to Improve a Dysfunctional Library

    Like other workplaces, libraries can sometimes be stressful, with library workers bearing the brunt of such problems as uncivil patrons, poor communication, inadequate leadership, and toxic behaviors by fellow employees. But there’s hope. Following up their acclaimed examination of the dysfunctional library ("should be essential reading for library leaders" raves Jo... ... Read more

    $34.99 USD

  • Cultivating Compassion

    How Digital Storytelling is Transforming Healthcare

    Edited by Pip Hardy, Tony Sumner ...
    This book explores how digital storytelling can catalyze change in healthcare. Edited by the co-founders of the award-winning Patient Voices Programme, the authors discuss various applications for this technique; from using digital storytelling as a reflective process, to the use of digital stories in augmenting quantitative data. Through six main sections this second edition covers areas ... Read more

    $98.99 USD

  • Cultivating Connected Learning

    Library Programs for Youth

    Series series Libraries Unlimited Professional Guides for Young Adult Librarians Series
    If you want to boost your library's relevancy and support youth learning, consider incorporating connected learning at your library. This book helps you to realize the potential of this exciting and dynamic trend.Learning doesn't just happen in the classroom: it happens everywhere. The connected learning model supports this principle, asserting that young people learn best when their experiences ... Read more

    $44.99 USD