Data encryption books

4195 books were found.

Modern Cryptography, Probabilistic Proofs and Pseudorandomness

Modern Cryptography, Probabilistic Proofs and Pseudorandomness...

Author: Oded Goldreich
ISBN: 9783642084324
Format: Paperback
$340.56

Whereas classical cryptography was confined to the art of designing and breaking encryption schemes (or ""secrecy...  Read More >>

Data Mining for Design and Manufacturing: Methods and Applications

Data Mining for Design and Manufacturing: Methods and...

Author: D. Braha
ISBN: 9781441952059
Format: Paperback
$393.36

Data Mining for Design and Manufacturing: Methods and Applications is the first book that brings together research...  Read More >>

Economics of Information Security

Economics of Information Security

Author: L. Jean Camp ,  Stephen Lewis
ISBN: 9781441954732
Format: Paperback
$446.16

Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but...  Read More >>

Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government: 5th IFIP Conference on e-Commerce, e-Business, and e-Government (I3E'2005), October 28-30 2005, Poznan, Poland

Challenges of Expanding Internet: E-Commerce, E-Business,...

Author: Matohisa Funabashi ,  Adam Grzech
ISBN: 9781441939524
Format: Paperback
$620.40

2.1 E-Government: e-Governance and e-Democracy The term Electronic Government (e-Government), as an expression,...  Read More >>

Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan

Security and Privacy in the Age of Ubiquitous Computing:...

Author: Ryoichi Sasaki ,  Eiji Okamoto
ISBN: 9781441938190
Format: Paperback
$657.36

Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security,...  Read More >>

Quality Of Protection: Security Measurements and Metrics

Quality Of Protection: Security Measurements and Metrics...

Author: Dieter Gollmann ,  Fabio MASSACCI
ISBN: 9781441939654
Format: Paperback
$419.76

Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection...  Read More >>

Secure Multi-Party Non-Repudiation Protocols and Applications

Secure Multi-Party Non-Repudiation Protocols and Applications...

Author: José A. Onieva ,  Jianying Zhou
ISBN: 9781441945396
Format: Paperback
$340.56

It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability...  Read More >>

Privacy, Security and Trust within the Context of Pervasive Computing

Privacy, Security and Trust within the Context of Pervasive...

Author: Philip Robinson ,  Harald Vogt
ISBN: 9781441936295
Format: Paperback
$393.36

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop...  Read More >>

Global Initiatives to Secure Cyberspace: An Emerging Landscape

Global Initiatives to Secure Cyberspace: An Emerging...

Author: Michael Portnoy ,  Seymour Goodman
ISBN: 9781441935304
Format: Paperback
$261.36

This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations...  Read More >>

Formal Aspects in Security and Trust: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France

Formal Aspects in Security and Trust: IFIP TC1 WG1.7...

Author: Theo Dimitrakos ,  Fabio Martinelli
ISBN: 9781441936851
Format: Paperback
$382.80

A reference for both academic and professional researchers in the field of security and trust. The papers presented...  Read More >>

Public-Key Cryptography

Public-Key Cryptography

Author: Arto Salomaa
ISBN: 9783642082542
Format: Paperback
$366.96

Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key...  Read More >>

Protocols for Authentication and Key Establishment

Protocols for Authentication and Key Establishment

Author: Colin Boyd ,  Anish Mathuria
ISBN: 9783642077166
Format: Paperback
$237.47

This is an overview of key establishment protocols.  Read More >>

Security in E-Learning

Security in E-Learning

Author: Edgar R. Weippl
ISBN: 9781441937223
Format: Paperback
$287.76

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand...  Read More >>

Guide to Elliptic Curve Cryptography

Guide to Elliptic Curve Cryptography

Author: Darrel Hankerson ,  Alfred J. Menezes
ISBN: 9781441929297
Format: Paperback
$327.36

Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide...  Read More >>

An Introduction to Mathematical Cryptography

An Introduction to Mathematical Cryptography

Author: Jeffrey Hoffstein ,  Jill Pipher
ISBN: 9781441926746
Format: Paperback
$145.07

ThecreationofpublickeycryptographybyDi?eandHellmanin1976andthe subsequent invention of the RSA public key cryptosystem...  Read More >>

Fundamentals of Computer Security

Fundamentals of Computer Security

Author: Josef Pieprzyk ,  Thomas Hardjono
ISBN: 9783642077135
Format: Paperback
$287.76

Studies modern concepts of Computer Security. This book introduces the basic mathematical background necessary to...  Read More >>

Number Theory for Computing

Number Theory for Computing

Author: M. E. Hellmann ,  Song Y. Yan
ISBN: 9783642077104
Format: Paperback
$197.87

Modern cryptography depends heavily on number theory, with primality test­ ing, factoring, discrete logarithms (indices),...  Read More >>

Computer Viruses and Malware

Computer Viruses and Malware

Author: John Aycock
ISBN: 9781441940162
Format: Paperback
$287.76

It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses...  Read More >>

Topics in Geometry, Coding Theory and Cryptography

Topics in Geometry, Coding Theory and Cryptography

Author: Arnaldo Garcia ,  Henning Stichtenoth
ISBN: 9789048173457
Format: Paperback
$145.17

The theory of algebraic function fields over finite fields has its origins in number theory.  Read More >>

Introduction to Cryptography: Principles and Applications

Introduction to Cryptography: Principles and Applications...

Author: Hans Delfs ,  Helmut Knebl
ISBN: 9783642080401
Format: Paperback
$184.67

The second edition contains corrections, revisions and new material, including a complete description of the AES,...  Read More >>

The Austin Protocol Compiler

The Austin Protocol Compiler

Author: Tommy M. McGuire ,  Mohamed G. Gouda
ISBN: 9781441935885
Format: Paperback
$261.36

To help in closing this communication gap between the group of protocol verifiers and the group of protocol implementors,...  Read More >>

Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security...

Author: Bahram Javidi
ISBN: 9781441919205
Format: Paperback
$330.00

One aspect of homeland security issues with wide-ranging implications is information security. This book presents...  Read More >>

Unconstrained Face Recognition

Unconstrained Face Recognition

Author: Shaohua Kevin Zhou ,  Rama Chellappa
ISBN: 9781441938909
Format: Paperback
$340.56

Face recognition has been actively studied over years. This work provides a comprehensive review of this biometric,...  Read More >>

CryptoGraphics: Exploiting Graphics Cards For Security

CryptoGraphics: Exploiting Graphics Cards For Security...

Author: Debra Cook ,  Angelos D. Keromytis
ISBN: 9781441939647
Format: Paperback
$303.60

This is especially so for video conferencing, thin-client computing and Internet cafes.CryptoGraphics: Exploiting...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List