Data encryption books

4195 books were found.

Defeating the Hacker - a Non-technical Guide to It Security

Defeating the Hacker - a Non-technical Guide to It Security...

Author: Robert Schifreen
ISBN: 9780470025550
Format: Hardback
$105.57

The current struggle between IT security and computer hackers is reaching crisis point. Corporate dependency on...  Read More >>

Data Protection Handbook

Data Protection Handbook

Author: Susan Singleton
ISBN: 9780754529415
Format: Paperback
$250.96

Provides practical guidance for businesses and advisers on the procedures that they need to follow to ensure full...  Read More >>

Principles of Incident Response and Disaster Recovery

Principles of Incident Response and Disaster Recovery...

Author: Michael Whitman ,  Herbert Mattord
ISBN: 9781418836634
Format: Paperback
$353.63

Presenting a foundation in disaster recovery principles and planning, this book emphasizes the importance of incident...  Read More >>

Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings

Theory of Cryptography: Third Theory of Cryptography...

Author: Shai Halevi ,  Tal Rabin
ISBN: 9783540327318
Format: Paperback
$303.60

Constitutes the refereed proceedings of the Third Theory of Cryptography Conference, TCC 2006, held in New York,...  Read More >>

The Software Security Library Boxed Set

The Software Security Library Boxed Set

Author: Gary R. McGraw ,  John Viega
ISBN: 9780321418708
Format: Mixed media product
$356.37

What is it about software that makes security such a problem? If you want to build secure software, how do you do...  Read More >>

Symbian OS Platform Security: Software Development Using the Symbian OS Security Architecture

Symbian OS Platform Security: Software Development Using...

Author: Craig Heath
ISBN: 9780470018828
Format: Paperback
$198.00

Symbian OS is an advanced, customizable operating system, which is licensed by the world's leading mobile phone...  Read More >>

Security of Multimedia Content: Technical Solutions, Legislation and Business Models

Security of Multimedia Content: Technical Solutions,...

Author: Ahmet Eskicioglu ,  Edward J. Delp
ISBN: 9780470025901
Format: Hardback
$316.80

Security of Multimedia Content: Technical Solutions, Legislation and Business Models provides a valuable overview...  Read More >>

Information Security Applications: 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers

Information Security Applications: 6th International...

Author: Jooseok Song ,  Taekyoung Kwon
ISBN: 9783540310129
Format: Paperback
$190.08

Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held...  Read More >>

Preventing Web Attacks with Apache

Preventing Web Attacks with Apache

Author: Ryan C. Barnett
ISBN: 9780321321282
Format: Paperback
$145.17

Reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how...  Read More >>

Recent Advances in Intrusion Detection: 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers

Recent Advances in Intrusion Detection: 8th International...

Author: Alfonso Valdes ,  Diego Zamboni
ISBN: 9783540317784
Format: Paperback
$224.27

We had sessions on the detection and containment of Internet worm attacks, anomaly detection, automated response...  Read More >>

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings

Author: Marc Fossorier ,  Hideki Imai
ISBN: 9783540314233
Format: Paperback
$190.08

The 25 revised full papers presented here together with 7 invited papers address subjects such as block codes; algebra...  Read More >>

Home PC Secruity Guide

Home PC Secruity Guide

Author: Dawson Ed
ISBN: 9780975241493
Format: Paperback
$14.95

Shows the reader how to guard agains rampant viruses and worms, and to identify hacker threats.  Read More >>

Security Log Management: Identifying Patterns in the Chaos

Security Log Management: Identifying Patterns in the...

Author: Jacob Babbin (Contractor with a government agency filling the role of Intrusion Detection Team Lead)
ISBN: 9781597490429
Format: Paperback
$137.15

Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable...  Read More >>

Topics in Cryptology -- CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings

Topics in Cryptology -- CT-RSA 2006: The Cryptographers'...

Author: David Pointcheval
ISBN: 9783540310334
Format: Paperback
$224.27

The RSA R Conference, with over 15,000attendees, as well as over 225 sponsors and exhibitors, is the largest computer...  Read More >>

Hacking Exposed Cisco Networks

Hacking Exposed Cisco Networks

Author: Andrew Vladimirov ,  Konstantin Gavrilenko
ISBN: 9780072259179
Format: Paperback
$110.95

First to market! This is the only book focusing solely on Cisco network hacking, security auditing and defense...  Read More >>

Authentication Codes and Combinatorial Designs

Authentication Codes and Combinatorial Designs

Author: Dingyi Pei ,  Dingyi Pei
ISBN: 9781584884736
Format: Hardback
$140.00

Covers optimal authentication codes, unconditionally secure authentication schemes, and both symmetric and asymmetric...  Read More >>

Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant

Microsoft Internet Security and Acceleration (ISA) Server...

Author: Bud Ratliff ,  Jason Ballard
ISBN: 9780735621886
Format: Paperback
$79.17

Computers/Software.  Read More >>

Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance

Risk Management Solutions for Sarbanes-Oxley Section...

Author: John S. Quarterman
ISBN: 9780764598395
Format: Paperback
$171.60

Examines how risk management security technologies must prevent virus and computer attacks, as well as providing...  Read More >>

Guide to Network Defense and Countermeasures

Guide to Network Defense and Countermeasures

Author: Randy Weaver
ISBN: 9781418836795
Format: Paperback
$419.63

Aims to map to the exam objectives for the Security Certified Network Professional exam.  Read More >>

Perfect Password: Selection, Protection, Authentication

Perfect Password: Selection, Protection, Authentication...

Author: Mark Burnett (Independent researcher, consultant, and writer specializing in Windows security)
ISBN: 9781597490412
Format: Paperback
$68.51

Teaches users how to select passwords that always meet complexity requirements. This book examines the password...  Read More >>

Writing Security Tools and Exploits

Writing Security Tools and Exploits

Author: James Foster
ISBN: 9781597499972
Format: Paperback
$137.15

 Read More >>

Information Technology Security and Risk Management

Information Technology Security and Risk Management...

Author: Jill Slay ,  Andy Koronios
ISBN: 9780470805749
Format: Paperback
$191.40

IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business...  Read More >>

Nine Steps to Success: A n ISO 27001 Implementation Overview

Nine Steps to Success: A n ISO 27001 Implementation...

Author: Alan Calder
ISBN: 9781905356126
Format: Paperback
$79.07

ISO 27001:2005 replaced the information security standard BS7799-2 from October, 2005. This book offers practical...  Read More >>

Cybersecurity & Homeland Security

Cybersecurity & Homeland Security

Author: Lin V Choi
ISBN: 9781594547287
Format: Paperback
$102.96

 Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List