Data encryption books

4195 books were found.

Endpoint Security

Endpoint Security

Author: Mark Kadrich
ISBN: 9780321436955
Format: Paperback
$210.67

Introduces a strategy to protecting your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing...  Read More >>

Botnets: The Killer Web Applications

Botnets: The Killer Web Applications

Author: Craig Schiller (CISO for Portland State University and President of Hawkeye Security Training, LLC) ,  James R. Binkley (Teacher, network engineer, and researcher, Portland State University, USA)
ISBN: 9781597491358
Format: Paperback
$131.87

Features the real world cases of botnet attacks to underscore the need for action. This title explains botnet fundamentals...  Read More >>

Professional Rootkits

Professional Rootkits

Author: Ric Vieler
ISBN: 9780470101544
Format: Paperback
$131.97

Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to...  Read More >>

Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers

Information Security Applications: 7th International...

Author: Jae-Kwang Lee ,  Okyeon Yi
ISBN: 9783540710929
Format: Paperback
$211.07

Constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA...  Read More >>

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings

Intelligence and Security Informatics: Pacific Asia...

Author: Christopher C. Yang ,  Daniel Zeng
ISBN: 9783540715481
Format: Paperback
$184.67

Constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI...  Read More >>

Public Key Cryptography - PKC 2007: 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings

Public Key Cryptography - PKC 2007: 10th International...

Author: Tatsuaki Okamoto ,  Xiaoyun Wang
ISBN: 9783540716761
Format: Paperback
$250.80

Constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography,...  Read More >>

Privacy on the Line: The Politics of Wiretapping and Encryption

Privacy on the Line: The Politics of Wiretapping and...

Author: Whitfield Diffie ,  Susan Landau (Senior Staff Privacy Analyst, Google)
ISBN: 9780262042406
Format: Hardback
$79.07

A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act...  Read More >>

Grid Computing Security

Grid Computing Security

Author: Anirban Chakrabarti
ISBN: 9783540444923
Format: Hardback
$237.47

Together with a brief introduction into grid computing in general and underlying security technologies, this book...  Read More >>

Computer Forensics: Evidence Collection and Management

Computer Forensics: Evidence Collection and Management...

Author: Robert C. Newman
ISBN: 9780849305610
Format: Hardback
$120.00

Examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers,...  Read More >>

Introduction to Cryptography: Principles and Applications

Introduction to Cryptography: Principles and Applications...

Author: Hans Delfs ,  Helmut Knebl
ISBN: 9783540492436
Format: Hardback
$184.67

Includes a section that covers key concepts of cryptography, from encryption and digital signatures to cryptographic...  Read More >>

ISO27001 Assessments without Tears: A Pocket Guide

ISO27001 Assessments without Tears: A Pocket Guide

Author: Steve Watkins
ISBN: 9781905356188
Format: Paperback
$26.27

 Read More >>

Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)

Recommendation for Pair-Wise Key Establishment Schemes...

Author: Elaine Barker ,  Don Johnson
ISBN: 9781495447501
Format: Paperback
$31.02

This Recommendation specifies key establishment schemes using discrete logarithm cryptography, based on standards...  Read More >>

CEHTM - Official Certified Ethical Hacker Review Guide: Exam 312-50

CEHTM - Official Certified Ethical Hacker Review Guide:...

Author: Kimberly Graves ,  Todd Lammle
ISBN: 9780782144376
Format: Mixed media product
$79.17

Prepare for the CEH certification exam with this official review guide and learn how to identify security risks...  Read More >>

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Author: Michael Cross, MD (Hospital for Special Surgery) ,  Matt Fisher
ISBN: 9781597490610
Format: Paperback
$137.15

Provides explicit hacks, tutorials, penetration tests, and demonstrations for security professionals and Web application...  Read More >>

Computer Security and Cryptography

Computer Security and Cryptography

Author: Alan G. Konheim (University of California at Santa Barbara)
ISBN: 9780471947837
Format: Hardback
$288.95

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all...  Read More >>

Foundations of Security: What Every Programmer Needs to Know

Foundations of Security: What Every Programmer Needs...

Author: Christoph Kern ,  Anita Kesavan
ISBN: 9781590597842
Format: Paperback
$64.99

Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art...  Read More >>

Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings

Theory of Cryptography: 4th Theory of Cryptography Conference,...

Author: Salil P. Vadhan
ISBN: 9783540709350
Format: Paperback
$287.76

Constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam,...  Read More >>

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI

Complete Guide to Security and Privacy Metrics: Measuring...

Author: Debra S. Herrmann (Biological Computing Initiative, North Bethesda, Maryland, USA)
ISBN: 9780849354021
Format: Hardback
$336.38

Defines more than 900 metrics measuring compliance with legislation, resiliency of security controls, and return...  Read More >>

PC Magazine  Windows Vista Security Solutions

PC Magazine Windows Vista Security Solutions

Author: Dan DiNicolo
ISBN: 9780470046562
Format: Paperback
$79.17

Offers a roadmap to protecting Vista against new and unexpected security threats that might arise to hijack your...  Read More >>

Elsevier's Dictionary of Information Security

Elsevier's Dictionary of Information Security

Author: G. Manoilov ,  B. Radichkova
ISBN: 9780444517708
Format: Hardback
$673.20

Contains terms that are used in the broad fields of electronics data protection and data management in the interconnected...  Read More >>

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

Phishing and Countermeasures: Understanding the Increasing...

Author: Markus Jakobsson ,  Steven Myers
ISBN: 9780471782452
Format: Hardback
$227.95

Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures....  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List