Data encryption books

4195 books were found.

Designing Bsd Rootkits

Designing Bsd Rootkits

Author: Joseph Kong
ISBN: 9781593271428
Format: Paperback
$79.07

"""Designing BSD Rootkits"" introduces the fundamentals of programming and developing rootkits under the FreeBSD...  Read More >>

Rootkits For Dummies

Rootkits For Dummies

Author: Larry Stevenson ,  Nancy Altholz
ISBN: 9780471917106
Format: Paperback
$79.17

A rootkit is a type of malicious software that gives the hacker root or administrator access to your network....  Read More >>

Art of Software Security Assessment, The: Identifying and Preventing Software Vulnerabilities

Art of Software Security Assessment, The: Identifying...

Author: Mark Dowd ,  John McDonald
ISBN: 9780321444424
Format: Paperback
$100.95

An insider's guide to auditing software security. It uncovers vulnerabilities in applications ranging from sendmail...  Read More >>

Current Issues and Trends in E-government Research

Current Issues and Trends in E-government Research

Author: Donald Norris
ISBN: 9781599042831
Format: Hardback
$203.95

Provides a synopsis of the technologies in information policy, security, privacy, and access, as well as the best...  Read More >>

Progress in Cryptology - VIETCRYPT 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers

Progress in Cryptology - VIETCRYPT 2006: First International...

Author: Phong Q. Nguyen
ISBN: 9783540687993
Format: Paperback
$197.87

Constitutes the refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT...  Read More >>

Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers

Security and Privacy in Ad-Hoc and Sensor Networks:...

Author: Levente Buttyan ,  Virgil Gligor
ISBN: 9783540691723
Format: Paperback
$158.27

Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS...  Read More >>

Topics in Cryptology – CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings

Topics in Cryptology – CT-RSA 2007: The Cryptographers'...

Author: Masayuki Abe
ISBN: 9783540693277
Format: Paperback
$237.47

All the submissions were reviewed by at least three reviewers, which was possible by the hard work of 23 Program...  Read More >>

Understanding DB2 9 Security

Understanding DB2 9 Security

Author: Rebecca Bond ,  Kevin Yeung-Kuen See
ISBN: 9780131345904
Format: Hardback
$145.17

Serving as a guide to securing DB2, this book provides DBAs and their managers with security information. It offers...  Read More >>

Computer Security and Cryptography

Computer Security and Cryptography

Author: Alan G Konheim
ISBN: 9786610821891
Format: Electronic book text
$670.56

 Read More >>

Privacy Enhancing Technologies: 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers

Privacy Enhancing Technologies: 6th International Workshop,...

Author: George Danezis ,  Philippe Golle
ISBN: 9783540687900
Format: Paperback
$211.07

Constitutes the refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET...  Read More >>

Critical Information Infrastructures Security: First International Workshop, CRITIS 2006, Samos Island, Greece, August 31 - September 1, 2006

Critical Information Infrastructures Security: First...

Author: Javier Lopez
ISBN: 9783540690832
Format: Paperback
$171.47

Constitutes the refereed post-proceedings of the First International Workshop on Critical Information Infrastructures...  Read More >>

Administering Windows Vista Security: The Big Surprises

Administering Windows Vista Security: The Big Surprises...

Author: Mark Minasi ,  Byron Hynes
ISBN: 9780470108321
Format: Mixed media product
$105.57

An Inside Look at Windows Vista Security for Systems Administrators Get an early start on Windows Vista security...  Read More >>

Data Warehousing and Data Mining Techniques for Cyber Security

Data Warehousing and Data Mining Techniques for Cyber...

Author: Anoop Singhal
ISBN: 9780387264097
Format: Hardback
$287.76

Data warehousing and data mining provide techniques for collecting information from distributed databases and for...  Read More >>

Electronic Postage Systems: Technology, Security, Economics

Electronic Postage Systems: Technology, Security, Economics...

Author: Gerrit Bleumer
ISBN: 9780387293134
Format: Hardback
$366.96

This book is the first comprehensive overview of contemporary systems for secure electronic/digital postage. It...  Read More >>

Network Security Policies and Procedures

Network Security Policies and Procedures

Author: Douglas W. Frye
ISBN: 9780387309378
Format: Hardback
$366.96

Company network administrators are compelled today to aggressively pursue a robust network security regime. This...  Read More >>

Secure Data Management in Decentralized Systems

Secure Data Management in Decentralized Systems

Author: Ting Yu ,  Sushil Jajodia
ISBN: 9780387276946
Format: Hardback
$340.56

Database security is one of the classical topics in the research of information system security. In recent years,...  Read More >>

Information Systems Security: Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings

Information Systems Security: Second International Conference,...

Author: Aditya Bagchi ,  Vijayalakshmi Atluri
ISBN: 9783540689621
Format: Paperback
$197.87

Constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS...  Read More >>

Cryptography for Developers

Cryptography for Developers

Author: Tom St Denis (senior software developer and cryptographer for the Advanced Micro Devices Corporation.)
ISBN: 9781597491044
Format: Paperback
$166.19

Acts as a guide for software developers who must learn and implement cryptography. Introducing the subject of cryptography,...  Read More >>

Privacy in Statistical Databases: CENEX-SDC Project International Conference, PSD 2006, Rome, Italy, December 13-15, 2006, Proceedings

Privacy in Statistical Databases: CENEX-SDC Project...

Author: Josep Domingo-Ferrer ,  Luisa Franconi
ISBN: 9783540493303
Format: Paperback
$190.08

Privacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the...  Read More >>

Progress in Cryptology - INDOCRYPT 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings

Progress in Cryptology - INDOCRYPT 2006: 7th International...

Author: Rana Barua ,  Tanja Lange
ISBN: 9783540497677
Format: Paperback
$221.76

Constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006,...  Read More >>

Cryptology and Network Security: 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings

Cryptology and Network Security: 5th International Conference,...

Author: David Pointcheval ,  Yi Mu
ISBN: 9783540494621
Format: Paperback
$190.08

Constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS...  Read More >>

Web Hacking from the Inside Out

Web Hacking from the Inside Out

Author: Michael Flenov
ISBN: 9781931769631
Format: Mixed media product
$105.47

Covering technologies used to search for vulnerabilities on websites from a hacker's point of view, this book on...  Read More >>

Information and Communications Security: 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings

Information and Communications Security: 8th International...

Author: Peng Ning ,  Ninghui Li
ISBN: 9783540494966
Format: Paperback
$261.36

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications...  Read More >>

Advances in Cryptology -- ASIACRYPT 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings

Advances in Cryptology -- ASIACRYPT 2006: 12th International...

Author: Xuejia Lai ,  Kefei Chen
ISBN: 9783540494751
Format: Paperback
$250.80

Constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List