Data encryption books

4195 books were found.

Computer Security Handbook

Computer Security Handbook

Author: Seymour Bosworth ,  Michel E. Kabay
ISBN: 9780471716532
Format: CD-ROM
$583.31

* Computer professionals need to protect the information and networks that are vital to their organization. * This...  Read More >>

Managing Information Risk and the Economics of Security

Managing Information Risk and the Economics of Security...

Author: M Eric Johnson
ISBN: 9780387561752
Format: Undefined
$65.87

<p>This book explores the economic, behavioral and legal factors that drive information security risks and solutions....  Read More >>

Post-Quantum Cryptography

Post-Quantum Cryptography

Author: Daniel J Bernstein ,  Johannes Buchmann
ISBN: 9783540887034
Format: Undefined
$65.87

<p>This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer...  Read More >>

Distributed Systems Security: Issues, Processes and Solutions

Distributed Systems Security: Issues, Processes and...

Author: Abhijit Belapurkar (Infosys Technologies Ltd.) ,  Anirban Chakrabarti (Infosys Technologies, India)
ISBN: 9780470519882
Format: Hardback
$172.95

Presents an overview of Distributed Systems security concerns, challenges, processes and solutions. Discusses threats...  Read More >>

Computer Security Handbook

Computer Security Handbook

Author: Seymour Bosworth ,  Michel E. Kabay
ISBN: 9780471716525
Format: Paperback
$583.31

Computer Security Handbook, Fifth Edition provides comprehensive coverage of the broad scope of issues relating...  Read More >>

Post-Quantum Cryptography

Post-Quantum Cryptography

Author: Johannes Buchmann ,  Jintai Ding
ISBN: 9783540890379
Format: Undefined
$65.87

<p>This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer...  Read More >>

Research in Cryptology

Research in Cryptology

Author: Stefan Lucks ,  Ahmad-Reza Sadeghi
ISBN: 9783540883975
Format: Undefined
$65.87

Constitutes the refereed proceedings of the Second Western European Workshop on Research in Cryptology, WEWoRC 2007,...  Read More >>

Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks

Principles, Systems and Applications of IP Telecommunications....

Author: Henning Schulzrinne ,  Radu State
ISBN: 9783540891536
Format: Undefined
$65.87

<p>This book constitutes the thoroughly refereed proceedings of the 10th International Workshop on Principles, Systems...  Read More >>

Progress in Cryptology - Indocrypt 2008

Progress in Cryptology - Indocrypt 2008

Author: Dipanwita Roy Chowdhury ,  Vincent Rijmen
ISBN: 9783540897552
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008,...  Read More >>

Information Systems Security

Information Systems Security

Author: R Sekar ,  Arun K Pujari
ISBN: 9783540898634
Format: Undefined
$65.87

<p>This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security,...  Read More >>

Governance of Picture Archiving and Communications Systems: Data Security and Quality Management of Filmless Radiology

Governance of Picture Archiving and Communications Systems:...

Author: Carrison K.S. Tong ,  Eric T.T. Wong
ISBN: 9781599046723
Format: Hardback
$479.95

Examines information security management for the facilitation of picture archiving and communication systems.  Read More >>

Elementary Number Theory, Cryptography and Codes

Elementary Number Theory, Cryptography and Codes

Author: Maria Welleda Baldoni ,  Ciro Ciliberto
ISBN: 9783540865070
Format: Undefined
$65.87

This text covers basic techniques from algebra and number theory which have recently proven to be extremely useful...  Read More >>

Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes

Enhancing Cryptographic Primitives with Techniques from...

Author: Bart Preneel ,  S. Dodunekov
ISBN: 9781607500025
Format: Hardback
$440.88

The NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting...  Read More >>

Disappearing Cryptography: Information Hiding: Steganography and Watermarking

Disappearing Cryptography: Information Hiding: Steganography...

Author: Peter Wayner (Writer, Baltimore, MD, USA)
ISBN: 9780123744791
Format: Paperback
$158.27

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques....  Read More >>

Digital Watermarking: 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007, Proceedings

Digital Watermarking: 6th International Workshop, IWDW...

Author: Yun Q. Shi ,  Hyoung-Joong Kim
ISBN: 9783540922377
Format: Paperback
$245.39

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou,...  Read More >>

Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth

Mathematical Methods in Computer Science: Essays in...

Author: Jacques Calmet ,  Willi Geiselmann
ISBN: 9783540899938
Format: Paperback
$184.67

This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS...  Read More >>

Program Transformation Techniques for Enhancing Software Security

Program Transformation Techniques for Enhancing Software...

Author: R. Sekar ,  Rob Johnson
ISBN: 9781598295689
Format: Paperback
$105.60

 Read More >>

Cryptographic Engineering

Cryptographic Engineering

Author: Cetin Kaya Koc
ISBN: 9780387718163
Format: Hardback
$340.56

Intended for a graduate-level course in Cryptographic Engineering, this text will teach students with a basic knowledge...  Read More >>

Primality Testing and Integer Factorization in Public-Key Cryptography

Primality Testing and Integer Factorization in Public-Key...

Author: Song Y. Yan
ISBN: 9780387772677
Format: Hardback
$314.16

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS...  Read More >>

Secure Multi-Party Non-Repudiation Protocols and Applications

Secure Multi-Party Non-Repudiation Protocols and Applications...

Author: José A. Onieva ,  Jianying Zhou
ISBN: 9780387756295
Format: Hardback
$340.56

It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability...  Read More >>

Progress in Cryptology - INDOCRYPT 2008: 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

Progress in Cryptology - INDOCRYPT 2008: 9th International...

Author: Dipanwita Roy Chowdhury ,  Vincent Rijmen
ISBN: 9783540897538
Format: Paperback
$245.39

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT...  Read More >>

Web Security Testing Cookbook

Web Security Testing Cookbook

Author: Brian Hope ,  Ben Walther
ISBN: 9780596514839
Format: Paperback
$105.57

Offers developers and testers the tools they need to make security testing a regular part of their development lifecycle....  Read More >>

Post-Quantum Cryptography

Post-Quantum Cryptography

Author: Daniel J Bernstein (Computer Science Services Group, Kansas) ,  Johannes Buchmann
ISBN: 9781282000919
Format: Undefined
$261.36

Constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List