Data encryption books

4195 books were found.

Advances in Cryptology – EUROCRYPT 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008, Proceedings

Advances in Cryptology – EUROCRYPT 2008: 27th Annual...

Author: Nigel Smart
ISBN: 9783540789666
Format: Paperback
$261.36

Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of...  Read More >>

Security Issues in Ad-Hoc Networks

Security Issues in Ad-Hoc Networks

Author: Mike Burmester ,  Alec Yasinsac
ISBN: 9780387244334
Format: Hardback
$237.47

Ad-hoc networks are dynamic collections of self-organizing mobile wireless nodes with links that are changing in...  Read More >>

Modern Cryptanalysis: Techniques for Advanced Code Breaking

Modern Cryptanalysis: Techniques for Advanced Code Breaking...

Author: Christopher Swenson
ISBN: 9780470135938
Format: Hardback
$132.00

Fighting new threats with an old weapon As an instructor at the University of Tulsa, Christopher Swenson could...  Read More >>

Guide to Strategic Infrastructure Security

Guide to Strategic Infrastructure Security

Author: Randy Weaver
ISBN: 9781418836610
Format: Paperback
$327.23

Maps the exam objectives for the Security Certified Network Professional (SCNP) exam. Designed to help students...  Read More >>

Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers

Information Security: A Manager's Guide to Thwarting...

Author: Philip Alexander
ISBN: 9780313345586
Format: Hardback
$110.00

 Read More >>

Introduction to Identity-Based Encryption

Introduction to Identity-Based Encryption

Author: Luther Martin
ISBN: 9781596932388
Format: Hardback
$250.80

 Read More >>

Cryptography and Security Services: Mechanisms and Applications

Cryptography and Security Services: Mechanisms and Applications...

Author: Manuel Mogollon
ISBN: 9781599048376
Format: Hardback
$213.95

Compiles authoritative research on fundamental encryption algorithms and systems supported in information technology...  Read More >>

Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008, Proceedings

Theory of Cryptography: Fifth Theory of Cryptography...

Author: Ran Canetti
ISBN: 9783540785231
Format: Paperback
$287.76

This book constitutes the refereed proceedings of the Fifth Theory of Cryptography Conference, TCC 2008. It covers...  Read More >>

Public Key Cryptography – PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings

Public Key Cryptography – PKC 2008: 11th International...

Author: Ronald Cramer
ISBN: 9783540784395
Format: Paperback
$211.07

This book contains the proceedings of the 11th International Workshop on Practice and Theory in Public-Key Cryptography....  Read More >>

Legal Protection of Computer Software: Information Technology

Legal Protection of Computer Software: Information Technology...

Author: David Bainbridge
ISBN: 9781845924508
Format: Paperback
$522.72

Taking account of the legislative changes, this title offers guidance and workable policies and solutions to issues...  Read More >>

Safeguarding Data in Global Electronic Financial Transactions

Safeguarding Data in Global Electronic Financial Transactions...

Author: Catherine L. Mann
ISBN: 9780881324112
Format: Paperback
$71.15

Assesses the state of play with respect to customer and business concerns for personal data and the response of...  Read More >>

Secure Computer and Network Systems: Modeling, Analysis and Design

Secure Computer and Network Systems: Modeling, Analysis...

Author: Nong Ye (Arizona State University, USA)
ISBN: 9780470023242
Format: Hardback
$221.95

Cyber Security and Quality of Service: Modelling and Analysis for Systems Dependability presents a wide range of...  Read More >>

Vulnerability Analysis and Defense for the Internet

Vulnerability Analysis and Defense for the Internet...

Author: Abhishek Singh ,  B. Singh
ISBN: 9780387743899
Format: Hardback
$261.36

Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting...  Read More >>

Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers

Information Hiding: 9th International Workshop, IH 2007,...

Author: Teddy Furon ,  François Cayre
ISBN: 9783540773696
Format: Paperback
$211.07

We are glad to present in this volume the proceedings of the ninth edition of Information Hiding (IH 2007). We would...  Read More >>

Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers

Information Security Applications: 8th International...

Author: Kim Sehun ,  Moti Yung
ISBN: 9783540775348
Format: Paperback
$211.07

The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during...  Read More >>

SOA Security in Action

SOA Security in Action

Author: Ramarao Kanneganti
ISBN: 9781932394689
Format: Paperback
$158.37

SOA is one of the latest technologies enterprises are using to tame their software costs--in development, deployment,...  Read More >>

Trust And Security In Collaborative Computing

Trust And Security In Collaborative Computing

Author: Xukai Zou (Indiana Univ--purdue Univ At Indianapolis (Iupui), Usa) ,  Yuanshun Dai (Univ Of Tennessee, Usa)
ISBN: 9789812703682
Format: Hardback
$248.16

Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and...  Read More >>

Smart Cards, Tokens, Security and Applications

Smart Cards, Tokens, Security and Applications

Author: Keith Mayes ,  Konstantinos Markantonakis
ISBN: 9780387721972
Format: Hardback
$261.36

This book provides a broad overview of the many card systems and solutions in practical use today. It combines a...  Read More >>

Internet-Security aus Software-Sicht: Grundlagen der Software-Erstellung für sicherheitskritische Bereiche

Internet-Security aus Software-Sicht: Grundlagen der...

Author: Walter Kriha ,  Roland Schmitz
ISBN: 9783540222231
Format: Hardback
$52.67

Ziel der Autoren ist es, bei Entwicklern und Projektleitern ein grundlegendes Sicherheitsbewusstsein zu schaffen...  Read More >>

Student Plagiarism in an Online World: Problems and Solutions

Student Plagiarism in an Online World: Problems and...

Author: Tim S. Roberts
ISBN: 9781599048017
Format: Hardback
$384.95

Uses real-life situational examples to describe the legal and ethical issues surrounding plagiarism and the tools...  Read More >>

Principles of Information Security

Principles of Information Security

Author: Michael Whitman ,  Herbert Mattord
ISBN: 9781423901778
Format: Paperback
$303.47

Incorporating both the managerial and technical aspects of this discipline, the authors address knowledge areas...  Read More >>

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition

Cyber Forensics: A Field Manual for Collecting, Examining,...

Author: Albert Marcella, Jr. ,  Doug Menendez (CISA, Saint Louis, Missouri, USA)
ISBN: 9780849383281
Format: Hardback
$105.00

Offers information needed to track, monitor, investigate, document, and preserve both authorized and unauthorized...  Read More >>

Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers

Financial Cryptography and Data Security: 11th International...

Author: Sven Dietrich ,  Rachna Dhamija
ISBN: 9783540773658
Format: Paperback
$211.07

The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http://fc07. The conference...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List