Data encryption books

4195 books were found.

Information Systems, Technology and Management

Information Systems, Technology and Management

Author: Sushil K Prasad ,  Susmi Routray
ISBN: 9781282037915
Format: Electronic book text
$284.96

Constitutes the refereed proceedings of the Third International Conference on Information Systems, Technology and...  Read More >>

Business Resumption Planning

Business Resumption Planning

Author: Leo A. Wrobel (TelLAWCom Labs, Inc., Ovilla, Texas, USA) ,  David Tyree
ISBN: 9780849314599
Format: Hardback
$258.59

Offering practical advice along with templates, checklists, and directions to public domain information, this book...  Read More >>

Post-Quantum Cryptography

Post-Quantum Cryptography

Author: Daniel J. Bernstein ,  Johannes Buchmann
ISBN: 9783540887010
Format: Hardback
$237.47

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based...  Read More >>

Security in Computing Systems: Challenges, Approaches and Solutions

Security in Computing Systems: Challenges, Approaches...

Author: Joachim Biskup
ISBN: 9783540784418
Format: Hardback
$261.36

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying...  Read More >>

Data Security: Laws & Safeguards

Data Security: Laws & Safeguards

Author: Paulus R Wayleith
ISBN: 9781604562774
Format: Paperback
$131.94

 Read More >>

Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008

Advances in Cryptology - ASIACRYPT 2008: 14th International...

Author: Josef Pawel Pieprzyk
ISBN: 9783540892540
Format: Paperback
$277.20

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application...  Read More >>

E-Business and Telecommunications

E-Business and Telecommunications

Author: Joaquim Filipe
ISBN: 9781282459267
Format: Undefined
$630.96

Constitutes the thoroughly refereed post-conference proceedings of the 7th International Joint Conference on e-Business...  Read More >>

Auto-Identification and Ubiquitous Computing Applications

Auto-Identification and Ubiquitous Computing Applications...

Author: Judith Symonds (AUT University, New Zealand Auckland University of Technology, New Zealand Auckland University of Technology, New Zealand) ,  John Ayoade (American University of Nigeria, Nigeria)
ISBN: 9781282057135
Format: Electronic book text
$514.80

There is a need within radio-frequency identification (RFID) and other smart technologies to understand related...  Read More >>

Advances in Security Technology

Advances in Security Technology

Author: Haeng-kon Kim
ISBN: 9781282459120
Format: Undefined
$366.96

 Read More >>

Digitale Fernseh- Und Horfunktechnik in Theorie Und Praxis: MPEG-Basisbandcodierung, Dvb-, Dab-, ATSC-, Isdb-T-Ubertragungstechnik, Messtechnik

Digitale Fernseh- Und Horfunktechnik in Theorie Und...

Author: Walter Fischer
ISBN: 9781281927682
Format: Undefined
$261.36

Digitale Fernseh- und Horfunktechnik in Theorie und Praxis ist eine deutlich erweiterte zweite Auflage von Walter...  Read More >>

E-business and Telecommunications: 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers

E-business and Telecommunications: 4th International...

Author: Joaquim Filipe ,  Mohammad S. Obaidat
ISBN: 9783540886525
Format: Paperback
$287.76

Constitutes the papers of the 4th International Conference on E-business and Telecommunication Networks, ICETE 2007,...  Read More >>

Critical Information Infrastructures Security: Second International Workshop, CRITIS 2007, Benalmadena-Costa, Spain, October 3-5, 2007

Critical Information Infrastructures Security: Second...

Author: Bernhard Hämmerli ,  Bernhard Hammerli
ISBN: 9783540890959
Format: Paperback
$211.07

This volume contains the post-proceedings of the Second International Workshop on Critical Information Infrastructure...  Read More >>

Intrusion Detection

Intrusion Detection

Author: Wenke Lee ,  John Griffin
ISBN: 9781598295658
Format: Paperback
$105.60

 Read More >>

Operating System Security

Operating System Security

Author: Trent Jaeger ,  Ravi Sandhu
ISBN: 9781598292121
Format: Paperback
$118.80

Examines past research that outlines the requirements for a secure operating system and research that implements...  Read More >>

Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

Information Hiding: 10th International Workshop, IH...

Author: Kaushal Solanki ,  Kenneth Sullivan
ISBN: 9783540889601
Format: Paperback
$211.07

th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH...  Read More >>

Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks: Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers

Principles, Systems and Applications of IP Telecommunications....

Author: Henning Schulzrinne ,  Radu State
ISBN: 9783540890539
Format: Paperback
$211.07

These are the proceedings of IPTComm 2008 – the Second Conference on Pr- ciples,Systems andApplications ofIP Telecommunications–heldinHeidelberg,...  Read More >>

Security Engineering for Service-Oriented Architectures

Security Engineering for Service-Oriented Architectures...

Author: Michael Hafner ,  Ruth Breu
ISBN: 9783540795384
Format: Hardback
$184.67

Based on the paradigm of model-driven security, the authors of this book show how to systematically design and realize...  Read More >>

Provable Security: Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

Provable Security: Second International Conference,...

Author: Joon Sang Baek ,  Feng Bao
ISBN: 9783540887324
Format: Paperback
$211.07

This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec...  Read More >>

Information and Communications Security: 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings

Information and Communications Security: 10th International...

Author: Liqun Chen ,  Mark Ryan
ISBN: 9783540886242
Format: Paperback
$237.47

This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications...  Read More >>

Research in Cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

Research in Cryptology: Second Western European Workshop,...

Author: Stefan Lucks ,  Ahmad-Reza Sadeghi
ISBN: 9783540883524
Format: Paperback
$158.27

The papers cover topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key...  Read More >>

Network and Parallel Computing: IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008, Proceedings

Network and Parallel Computing: IFIP International Conference,...

Author: Jian Cao ,  Minglu Li
ISBN: 9783540881391
Format: Paperback
$314.16

Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008)...  Read More >>

Digital Forensics

Digital Forensics

Author: Yong Guan ,  Ravi Sandhu
ISBN: 9781598295719
Format: Paperback
$105.60

 Read More >>

Codes and Ciphers - A History of Cryptography

Codes and Ciphers - A History of Cryptography

Author: Alexander D'Agapeyeff
ISBN: 9781443736916
Format: Hardback
$101.51

A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List