Data encryption books

4195 books were found.

Vulnerability Analysis and Defense for the Internet

Vulnerability Analysis and Defense for the Internet...

Author: Abhishek Singh ,  B. Singh
ISBN: 9781441944986
Format: Paperback
$261.36

Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting...  Read More >>

Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and...

Author: Christopher Kruegel ,  Fredrik Valeur
ISBN: 9781441936240
Format: Paperback
$287.76

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses...  Read More >>

Privacy-Respecting Intrusion Detection

Privacy-Respecting Intrusion Detection

Author: Ulrich Flegel
ISBN: 9781441941756
Format: Paperback
$261.36

The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties...  Read More >>

Preserving Privacy in On-Line Analytical Processing (OLAP)

Preserving Privacy in On-Line Analytical Processing...

Author: Lingyu Wang ,  Sushil Jajodia
ISBN: 9781441942784
Format: Paperback
$287.76

This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. It reviews a series of methods...  Read More >>

Privacy Preserving Data Mining

Privacy Preserving Data Mining

Author: Jaideep Vaidya ,  Christopher W. Clifton
ISBN: 9781441938473
Format: Paperback
$290.37

Privacy preserving data mining implies the ""mining"" of knowledge from distributed data without violating the privacy...  Read More >>

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks

Secure Localization and Time Synchronization for Wireless...

Author: Radha Poovendran ,  Cliff Wang
ISBN: 9781441940964
Format: Paperback
$393.36

This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc...  Read More >>

Privacy-Preserving Data Mining: Models and Algorithms

Privacy-Preserving Data Mining: Models and Algorithms...

Author: Charu C. Aggarwal ,  Philip S. Yu
ISBN: 9781441943712
Format: Paperback
$340.56

This book proposes a number of techniques to perform data mining tasks in a privacy-preserving way. The survey information...  Read More >>

Security, Privacy, and Trust in Modern Data Management

Security, Privacy, and Trust in Modern Data Management...

Author: Milan Petkovic ,  Willem Jonker
ISBN: 9783642089268
Format: Paperback
$287.76

Decisions on the limits of privacy intrusions – or privacy protection, for that matter – are ultimately political...  Read More >>

Information Security and Cryptology: 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers

Information Security and Cryptology: 5th International...

Author: Feng Bao ,  Moti Yung
ISBN: 9783642163418
Format: Paperback
$250.80

Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security...  Read More >>

Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings

Advances in Cryptology - ASIACRYPT 2010: 16th International...

Author: Masayuki Abe
ISBN: 9783642173721
Format: Paperback
$314.16

ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference...  Read More >>

Decision and Game Theory for Security: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

Decision and Game Theory for Security: First International...

Author: Tansu Alpcan ,  Levente Buttyán
ISBN: 9783642171963
Format: Paperback
$190.08

Securing complex and networked systems has become increasingly important as these systems play an indispensable...  Read More >>

Expert SQL Server 2008 Encryption

Expert SQL Server 2008 Encryption

Author: Michael Coles ,  Rodney Landrum
ISBN: 9786613292070
Format: Electronic book text
$158.37

<p>Every day organizations large and small fall victim to attacks on their data. Encryption provides a shield to...  Read More >>

Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

Privacy, Intrusion Detection and Response: Technologies...

Author: Peyman Kabiri (Iran University of Science and Technology, Iran)
ISBN: 9781283320375
Format: Electronic book text
$514.80

Though network security has almost always been about encryption and decryption, the field of network security is...  Read More >>

Microsoft Windows Security Essentials

Microsoft Windows Security Essentials

Author: Darril Gibson
ISBN: 9781283177252
Format: Electronic book text
$105.57

 Read More >>

Ceh Certified Ethical Hacker All-In-One Exam Guide

Ceh Certified Ethical Hacker All-In-One Exam Guide

Author: Matt Walker
ISBN: 9781283354301
Format: Electronic book text
$132.00

 Read More >>

Comptia Security+ All-In-One Exam Guide (Exam Sy0-301), 3rd Edition

Comptia Security+ All-In-One Exam Guide (Exam Sy0-301),...

Author: Wm Arthur Conklin (University of Houston---Houston) ,  Gregory White (University of Texas at San Antonio Smith College, USA Smith College, USA)
ISBN: 9781283357975
Format: Electronic book text
$158.40

Get complete coverage of all the objectives included on CompTIA Security+ exam inside this completely updated, comprehensive...  Read More >>

Rc4 Stream Cipher and Its Variants

Rc4 Stream Cipher and Its Variants

Author: Goutam Paul ,  Subhamoy Maitra (Indian Statistical Institute, Kolkata, India)
ISBN: 9781322614359
Format: Electronic book text
$263.87

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With...  Read More >>

Biometric System and Data Analysis: Design, Evaluation, and Data Mining

Biometric System and Data Analysis: Design, Evaluation,...

Author: Ted Dunstone ,  Neil Yager
ISBN: 9781441945952
Format: Paperback
$261.36

Biometric System and Data Analysis: Design, Evaluation, and Data Mining brings together aspects of statistics and...  Read More >>

Handbook of Database Security: Applications and Trends

Handbook of Database Security: Applications and Trends...

Author: Michael Gertz ,  Sushil Jajodia
ISBN: 9781441943057
Format: Paperback
$525.36

Along with the traditional security aspects of data integrity and availability, there is an increasing interest...  Read More >>

Advances in Information Processing and Protection

Advances in Information Processing and Protection

Author: Jerzy Pejas ,  Khalid Saeed
ISBN: 9781441944573
Format: Paperback
$446.16

The Computer Science is relatively new field which is developing very fast not only because due to the huge interest...  Read More >>

Securing Biometrics Applications

Securing Biometrics Applications

Author: Charles A. Shoniregun ,  Stephen Crosier
ISBN: 9781441943507
Format: Paperback
$287.76

Biometrics is becoming increasingly common in establishments that require high security such as state security and...  Read More >>

Network-Aware Security for Group Communications

Network-Aware Security for Group Communications

Author: Yan Sun ,  Wade Trappe
ISBN: 9781441943354
Format: Paperback
$261.36

Describes the advances in securing group communications. This book focuses on tailoring the security solution to...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List