Cryptography & Coding Theory

PUBLISHED


Viewing: 1 - 10 of 64
Published:
January 17, 2014
Author(s):
David Kahn
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking 
Add to cart
$59.95
Hardback
Published:
December 14, 2013
Editor(s):
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between 
Add to cart
$99.95
Hardback
Published:
August 19, 2013
Author(s):
Richard R. Brooks
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical 
Add to cart
$79.95
Hardback
Published:
July 22, 2013
Editor(s):
Qurban A. Memon
For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence, 
Add to cart
$159.95
Hardback
Published:
July 15, 2013
Author(s):
Robert H. Sloan, Richard Warner
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in 
Add to cart
$59.95
Paperback
Published:
June 18, 2013
Author(s):
Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming 
Add to cart
$89.95
Hardback
Published:
June 17, 2013
Author(s):
Gary L. Mullen, Daniel Panario
Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the 
Add to cart
$139.95
Hardback
Published:
June 13, 2013
Author(s):
San Ling, Huaxiong Wang, Chaoping Xing
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a 
Add to cart
$79.95
Hardback
Published:
June 07, 2013
Author(s):
Jacques M. Bahi, Christophe Guyeux
For computer scientists, especially those in the security field, the use of chaos has been limited to the computation of a small collection of famous but unsuitable maps that offer no explanation of why chaos is relevant in the considered contexts. Discrete Dynamical Systems and Chaotic Machines: 
Add to cart
$89.95
Hardback
Published:
May 08, 2013
Author(s):
Franjieh El Khoury
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured 
Add to cart
$119.95
Hardback

News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts, and promotions!

 

Data Mining "Nobel Prize" Awarded to Series Editor Vipin Kumar

The ACM SIGKDD 2012 Innovation Award, the highest award for technical excellence in the field of Knowledge Discovery and Data Mining (KDD), has been awarded to Prof. Vipin Kumar for his technical contributions to foundational research in data mining and its applications to mining scientific and climate data. Prof. Kumar is the editor of the Chapman & Hall/CRC Data Mining and Knowledge Discovery Series. He has pioneered research in the areas of high performance and parallel data mining. His research group has also been at the forefront in the development of data-driven discovery methods for analyzing global climate and ecosystem data.

 

Online Bestsellers:


New Handbook! A pioneering publication for researchers in computer science and engineering, Handbook of Energy-Aware and Green Computing - Two Volume Set is one of the first to present a comprehensive account of recent research in energy-aware and green computing.

New Textbooks!

Programming in C++ for Engineering and Science

A Concise Introduction to Programming in Python

Computers and Society: Computing for Good

Operating System Design: The Xinu Approach, Linksys Version

STAY CONNECTED!
Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us