Data encryption books

4195 books were found.

Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference

Security Management, Integrity, and Internal Control...

Author: Steve Furnell ,  Paul Dowland
ISBN: 9781441940056
Format: Paperback
$393.36

Features proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity,...  Read More >>

Primality Testing and Integer Factorization in Public-Key Cryptography

Primality Testing and Integer Factorization in Public-Key...

Author: Song Y. Yan
ISBN: 9781441945860
Format: Paperback
$314.16

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS...  Read More >>

Botnet Detection: Countering the Largest Security Threat

Botnet Detection: Countering the Largest Security Threat...

Author: Wenke Lee ,  Cliff Wang
ISBN: 9781441943309
Format: Paperback
$446.16

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field,...  Read More >>

Synchronizing Internet Protocol Security (SIPSec)

Synchronizing Internet Protocol Security (SIPSec)

Author: Charles A. Shoniregun
ISBN: 9781441940995
Format: Paperback
$366.96

The IPSec may be used in three different security - mains: Virtual private networks, Application-level security,...  Read More >>

Binary Quadratic Forms: An Algorithmic Approach

Binary Quadratic Forms: An Algorithmic Approach

Author: Johannes Buchmann ,  Ulrich Vollmer
ISBN: 9783642079719
Format: Paperback
$287.76

This book deals with algorithmic problems concerning binary quadratic forms 2 2 f(X,Y)= aX +bXY +cY with integer...  Read More >>

Biometric User Authentication for IT Security: From Fundamentals to Handwriting

Biometric User Authentication for IT Security: From...

Author: Claus Vielhauer
ISBN: 9781441938732
Format: Paperback
$330.00

Conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned...  Read More >>

Secure Key Establishment

Secure Key Establishment

Author: Kim-Kwang Raymond Choo
ISBN: 9781441946898
Format: Paperback
$314.16

An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway...  Read More >>

Data Warehousing and Data Mining Techniques for Cyber Security

Data Warehousing and Data Mining Techniques for Cyber...

Author: Anoop Singhal
ISBN: 9781441938916
Format: Paperback
$287.76

Data warehousing and data mining provide techniques for collecting information from distributed databases and for...  Read More >>

New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa

New Approaches for Security, Privacy and Trust in Complex...

Author: Hein Venter ,  Mariki Eloff
ISBN: 9781441944337
Format: Paperback
$525.36

This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC...  Read More >>

Intrusion Detection Systems

Intrusion Detection Systems

Author: Roberto Di Pietro ,  Luigi V. Mancini
ISBN: 9781441945853
Format: Paperback
$393.36

In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems...  Read More >>

Security for Wireless Sensor Networks

Security for Wireless Sensor Networks

Author: Donggang Liu ,  Peng Ning
ISBN: 9781441940988
Format: Paperback
$366.96

The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional...  Read More >>

Security for Telecommunications Networks

Security for Telecommunications Networks

Author: Patrick Traynor ,  Patrick McDaniel
ISBN: 9781441944382
Format: Paperback
$263.97

This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers...  Read More >>

Hop Integrity in the Internet

Hop Integrity in the Internet

Author: Chin-Tser Huang ,  Mohamed G. Gouda
ISBN: 9781441937445
Format: Paperback
$237.47

The protocols include:- Secure address resolution - Weak hop integrity - Strong hop integrity using soft sequence...  Read More >>

Image and Video Encryption: From Digital Rights Management to Secured Personal Communication

Image and Video Encryption: From Digital Rights Management...

Author: Andreas Uhl ,  Andreas Pommer
ISBN: 9781441936257
Format: Paperback
$303.60

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data.  Read More >>

Wireless Network Security

Wireless Network Security

Author: Yang Xiao ,  Xuemin Shen
ISBN: 9781441939197
Format: Paperback
$366.96

Discusses wireless security issues from physical layer to application layer. This book identifies important vulnerabilities...  Read More >>

Network Security Policies and Procedures

Network Security Policies and Procedures

Author: Douglas W. Frye
ISBN: 9781441940476
Format: Paperback
$366.96

Company network administrators are compelled today to aggressively pursue a robust network security regime. This...  Read More >>

Multivariate Public Key Cryptosystems

Multivariate Public Key Cryptosystems

Author: Jintai Ding ,  Jason E. Gower
ISBN: 9781441940773
Format: Paperback
$303.60

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years,...  Read More >>

Understanding Intrusion Detection through Visualization

Understanding Intrusion Detection through Visualization...

Author: Stefan Axelsson ,  David Sands
ISBN: 9781441939067
Format: Paperback
$290.37

In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating...  Read More >>

Malware Detection

Malware Detection

Author: Mihai Christodorescu ,  Somesh Jha
ISBN: 9781441940957
Format: Paperback
$472.56

Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e.,...  Read More >>

Communication and Networking: International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part I

Communication and Networking: International Conference,...

Author: Alan Chin-Chen Chang ,  MingChu Li
ISBN: 9783642175862
Format: Paperback
$221.76

Welcome to the proceedings of the 2010 International Conference on Future Gene- tion Communication and Networking...  Read More >>

Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings

Pairing-Based Cryptography - Pairing 2010: 4th International...

Author: Marc Joye ,  Atsuko Miyaji
ISBN: 9783642174544
Format: Paperback
$250.80

Constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing...  Read More >>

Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings

Cryptology and Network Security: 9th International Conference,...

Author: Swee-Huay Heng ,  Rebecca N. Wright
ISBN: 9783642176180
Format: Paperback
$219.12

P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible...  Read More >>

Insider Attack and Cyber Security: Beyond the Hacker

Insider Attack and Cyber Security: Beyond the Hacker...

Author: Salvatore J. Stolfo ,  Steven M. Bellovin
ISBN: 9781441945891
Format: Paperback
$287.76

This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume...  Read More >>

Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden

Security and Privacy in Dynamic Environments: Proceedings...

Author: Simone Fischer-Hübner ,  Kai Rannenberg
ISBN: 9781441941275
Format: Paperback
$551.76

This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIPISEC...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List