Data encryption books

4195 books were found.

E-Business and Telecommunication Networks

E-Business and Telecommunication Networks

Author: Joaquim Filipe ,  Helder Coelhas
ISBN: 9783540845423
Format: Undefined
$65.87

Constitutes the papers of the Third International Conference on E-business and Telecommunication Networks, ICETE...  Read More >>

Emerging Challenges for Security, Privacy and Trust

Emerging Challenges for Security, Privacy and Trust...

Author: Dimitris Gritzalis ,  Javier Lopez
ISBN: 9783642012457
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 24th IFIP TC 11 International Information Security Conference, SEC 2009,...  Read More >>

Applied Cryptography and Network Security

Applied Cryptography and Network Security

Author: Michel Abdalla ,  David Pointcheval
ISBN: 9783642019586
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security,...  Read More >>

Understanding and Applying Cryptography and Data Security

Understanding and Applying Cryptography and Data Security...

Author: Adam J. Elbirt
ISBN: 9781420061604
Format: Hardback
$128.00

A how-to guide for implementing algorithms and protocols. Addressing real-world implementation issues, it emphasizes...  Read More >>

Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers

Information Security and Cryptology: 4th International...

Author: Moti Yung ,  Peng Liu
ISBN: 9783642014390
Format: Paperback
$245.39

Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security...  Read More >>

Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

Information Security Management Metrics: A Definitive...

Author: W. Krag Brotby, CISM (Enterprise Security Architect, Thousand Oaks, California, USA)
ISBN: 9781420052855
Format: Hardback
$206.97

Offers an approach to developing and implementing relevant security metrics essential for effective security management....  Read More >>

SIP Security

SIP Security

Author: Dorgham Sisalem (FOKUS, Germany) ,  John Floroiu
ISBN: 9780470516362
Format: Hardback
$186.95

Internet Telephony is one of the most important and fastest growing technologies for emerging mobile networks, as...  Read More >>

Information Security and Cryptoloy - ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers

Information Security and Cryptoloy - ICISC 2008: 11th...

Author: Pil Joong Lee ,  Jung Hee Cheon
ISBN: 9783642007293
Format: Paperback
$237.47

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and...  Read More >>

Topics in Cryptology - CT-RSA 2009: The Cryptographers' Track at the RSA Conference 2009, San Francisco,CA, USA, April 20-24, 2009, Proceedings

Topics in Cryptology - CT-RSA 2009: The Cryptographers'...

Author: Marc Fischlin
ISBN: 9783642008610
Format: Paperback
$245.39

The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols,...  Read More >>

Cryptographic Hardware and Embedded Systems Ches 2008

Cryptographic Hardware and Embedded Systems Ches 2008...

Author: Elisabeth Oswald ,  Pankaj Rohatgi
ISBN: 9783540873068
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and...  Read More >>

Information Security and Cryptology

Information Security and Cryptology

Author: Moti Yung ,  Peng Liu
ISBN: 9783642014413
Format: Undefined
$65.87

Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security...  Read More >>

Topics in Cryptology - CT-Rsa 2009

Topics in Cryptology - CT-Rsa 2009

Author: Marc Fischlin
ISBN: 9783642008634
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA...  Read More >>

Computer Security: Protecting Digital Resources

Computer Security: Protecting Digital Resources

Author: Robert C Newman
ISBN: 9780763759940
Format: Paperback
$435.00

Today, society is faced with numerous internet schemes, fraudulent scams, and means of identity theft that threaten...  Read More >>

Sichere Systeme: Konzepte, Architekturen und Frameworks

Sichere Systeme: Konzepte, Architekturen und Frameworks...

Author: Walter Kriha ,  Roland Schmitz
ISBN: 9783540789581
Format: Hardback
$211.07

Heute entsteht Software meist auf der Basis von Frameworks, die bereits Sicherheitstechniken enthalten. Darüber...  Read More >>

Fast Software Encryption

Fast Software Encryption

Author: Kaisa Nyberg
ISBN: 9783540867432
Format: Undefined
$65.87

Constitutes the proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, held in Lausanne,...  Read More >>

Information Security and Cryptology

Information Security and Cryptology

Author: Dingyi Pei ,  Moti Yung
ISBN: 9783540872467
Format: Undefined
$65.87

Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security...  Read More >>

Information Theoretic Security

Information Theoretic Security

Author: Reihaneh Safavi-Naini
ISBN: 9783540873198
Format: Undefined
$65.87

Constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary,...  Read More >>

Advances in Cryptology - Crypto 2008

Advances in Cryptology - Crypto 2008

Author: David Wagner
ISBN: 9783540873457
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in...  Read More >>

Information Systems, Technology and Management

Information Systems, Technology and Management

Author: Sushil K Prasad ,  Susmi Routray
ISBN: 9783642004063
Format: Undefined
$65.87

Constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and...  Read More >>

Information Security Practice and Experience

Information Security Practice and Experience

Author: Feng Bao ,  Hui Li
ISBN: 9783642008443
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience,...  Read More >>

Trusted Computing - Challenges and Applications

Trusted Computing - Challenges and Applications

Author: Peter Lipp ,  Ahmad-Reza Sadeghi
ISBN: 9783540864714
Format: Undefined
$65.87

<p>This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference...  Read More >>

Formal Aspects in Security and Trust

Formal Aspects in Security and Trust

Author: Pierpaolo Degano ,  Joshua D Guttman
ISBN: 9783642014666
Format: Undefined
$65.87

Constitutes the refereed post-workshop proceedings of the 5th International Workshop on Formal Aspects in Security...  Read More >>

Theory of Cryptography: Sixth Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009, Proceedings

Theory of Cryptography: Sixth Theory of Cryptography...

Author: Omer Reingold
ISBN: 9783642004568
Format: Paperback
$287.76

TCC 2009, the 6th Theory of Cryptography Conference, was held in San Fr- cisco, CA, USA, March 15–17, 2009. The...  Read More >>

Public Key Cryptography - PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, CA, USA, March 18-20, 2009, Proceedings

Public Key Cryptography - PKC 2009: 12th International...

Author: Stanislaw Jarecki ,  Gene Tsudik
ISBN: 9783642004674
Format: Paperback
$261.36

The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols,...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List