The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, BlackBerry...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Mathematics; History; 20th century

  • Quantum Computational Number Theoryby Song Y. Yan

    Springer International Publishing 2015; US$ 109.00

    This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation,... more...

  • Computation, Cryptography, and Network Securityby Nicholas J. Daras; Michael Th. Rassias

    Springer International Publishing 2015; US$ 189.00

    Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories... more...

  • Why Cryptography Should Not Rely on Physical Attack Complexityby Juliane Krämer

    Springer Singapore 2015; US$ 99.00

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years... more...

  • Progress in Cryptology -- LATINCRYPT 2015by Kristin Lauter; Francisco Rodríguez-Henríquez

    Springer International Publishing 2015; US$ 84.00

    This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015. The 20 papers presented were carefully reviewed and selected from 49 submissions. They were organized in topical sections named: cryptographic protocols;... more...

  • Coding Theory and Applicationsby Raquel Pinto; Paula Rocha Malonek; Paolo Vettori

    Springer International Publishing 2015; US$ 169.00

    The topics covered in this book, written by researchers at the forefront of their field, represent some of the most relevant research areas in modern coding theory: codes and combinatorial structures, algebraic geometric codes, group codes, quantum codes, convolutional codes, network coding and cryptography. The book includes a survey paper on the... more...

  • Adversarial Risk Analysisby David L. Banks; Jesus M. Rios Aliaga; David Rios Insua

    CRC Press 2015; US$ 89.95

    Flexible Models to Analyze Opponent Behavior A relatively new area of research, adversarial risk analysis (ARA) informs decision making when there are intelligent opponents and uncertain outcomes. Adversarial Risk Analysis develops methods for allocating defensive or offensive resources against intelligent adversaries. Many examples throughout... more...

  • A Course in Mathematical Cryptographyby Gilbert Baumslag; Benjamin Fine; Martin Kreuzer; Gerhard Rosenberger

    De Gruyter 2015; US$ 70.00

    The subject of this book is mathematical cryptography. By this we mean the mathematics involved in cryptographic protocols. As the field has expanded, using both commutative and noncommutative algebraic objects as cryptographic platforms, a book describing and explaining all these mathematical methods is of immeasurable value. more...

  • Spieltheorie und Schuldrechtby Urs Schweizer

    Mohr Siebeck 2015; US$ 30.54

    Schuldrechtliche Bestimmungen verändern Entscheidungsanreize und beeinflussen damit die strategische Interaktion zwischen den Parteien eines Schuldverhältnisses. Zur Erfassung strategischer Interaktion bedienen sich zeitgemäße Wirtschaftswissenschaften der hoch entwickelten Spieltheorie. So verwendet auch Urs Schweizer die spieltheoretische Methode,... more...

  • Scalable Information Systemsby Jason J. Jung; Costin Badica; Attila Kiss

    Springer International Publishing 2015; US$ 60.00

    This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Scalable Information Systems, INFOSCALE 2014, held in September 2014 in Seoul, South Korea. The 9 revised full papers presented were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics such as scalable... more...

  • Information Theoretic Securityby Anja Lehmann; Stefan Wolf

    Springer International Publishing 2015; US$ 84.00

    This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Information Theoretic Security, ICITS 2015, held in Lugano, Switzerland, in May 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover a variety of topics at the intersection of cryptography,... more...