You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
In this dark comedy set in the idyllic English countryside. The local Lord hires a new physician to help him with his failing health. But, it is not long before strange things start to happen in the village and two inquisitive local residents search to reveal the truth!
This book contains a short story about the curious case of an unexpected letter, a Grandson, and his eccentric Grandmother, who was recently deceased.
This book contains a collection of original short stories written by Chris J Mitchell. They are set in the Victorian period and have been strongly influenced by the Victorian style of ghost story telling. The longest of the short stories, Taylor Sage, does however differ from that of a Victorian ghost story and its style and influences lie more in the modern horror genre. The short stories contained in this book, Angelus Letum - In The Shadow of Emotions - Scribe - The Return - There Were Rumours and Taylor Sage. Can be downloaded separately from the Google Play Store. The Return is also available to download for free.
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.
The mathematical theory and practice of cryptography and coding underpins the provision of effective security and reliability for data communication, processing, and storage. Theoretical and implementational advances in the fields of cryptography and coding are therefore a key factor in facilitating the growth of data communications and data networks of various types. Thus, this Eight International Conference in an established and successful IMA series on the theme of “Cryptography and Coding” was both timely and relevant. The theme of this conference was the future of coding and cryptography, which was touched upon in presentations by a number of invited speakers and researchers. The pa...
Immerse your students in contemporary and classic scholarly research and readings from the major branches of the criminal justice system This text/reader is a comprehensive, cutting-edge overview of the main research methods used in the fields of criminology and criminal justice. Snapshots of Research offers a wide range of modern research examples, as well as several classic articles, including a broad range of readings from the four major branches of the criminal justice system—policing, courts/law, juvenile justice, and corrections—that are relevant to career paths students may be interested in pursuing.
This book brings together leading international learning and attention researchers to provide both a comprehensive and wide-ranging overview of the current state of knowledge of this area as well as new perspectives and directions for the future.
This book constitutes the refereed proceedings of the 7th International Conference on Information and Communications Security, ICICS 2005, held in Beijing, China in December 2005. The 40 revised full papers presented were carefully reviewed and selected from 235 submissions. The papers are organized in topical sections on fair exchange, digital signatures, cryptographic protocols, cryptanalysis, network security, applied cryptography, key management, access control, applications, watermarking, and system security.
This book constitutes the refereed proceedings of the First International Conference on Applied Cryptography and Network Security, ACNS 2003, held in Kunming, China, in October 2003. The 32 revised full papers presented were carefully reviewed and selected from a total of 191 submissions. The papers are organized in topical sections on cryptographic applications, intrusion detection, cryptographic algorithms, digital signatures, security modeling, Web security, security protocols, cryptanalysis, key management, and efficient implementations.