Data encryption books

4195 books were found.

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

The Art of Intrusion: The Real Stories Behind the Exploits...

Author: Kevin D. Mitnick (Las Vegas, NV, Security Consultant) ,  William L. Simon (Rancho Santa Fe, CA, author )
ISBN: 9780471782667
Format: Paperback
$32.95

Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat...  Read More >>

CCSP SNRS Exam Certification Guide

CCSP SNRS Exam Certification Guide

Author: Greg Bastien ,  Sara Nasseh
ISBN: 9781587201530
Format: Mixed media product
$171.47

Part of the Exam Certification Guide Series , this work serves as a preparation guide for the Cisco SNRS exam 642-502....  Read More >>

Foundations of Computer Security

Foundations of Computer Security

Author: David Salomon
ISBN: 9781846281938
Format: Hardback
$197.87

 Read More >>

Geeks On Call Security and Privacy: 5 Minute Fixes

Geeks On Call Security and Privacy: 5 Minute Fixes

Author: Geeks on Call America Inc.
ISBN: 9780471774556
Format: Paperback
$39.57

The boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data,...  Read More >>

Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers

Information Hiding: 7th International Workshop, IH 2005,...

Author: Mauro Barni ,  Jordi Herrera Joancomartí
ISBN: 9783540290391
Format: Paperback
$237.47

Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held...  Read More >>

Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers

Security and Privacy in Ad-hoc and Sensor Networks:...

Author: Refik Molva ,  Gene Tsudik
ISBN: 9783540309123
Format: Paperback
$184.67

It was a pleasure to take part in the 2005 European Workshop on Security and Privacy in Ad Hoc and Sensor Networks...  Read More >>

Enterprise Security: IT Security Solutions –– Concepts, Practical Experiences, Technologies

Enterprise Security: IT Security Solutions –– Concepts,...

Author: Walter Fumy ,  Jörg Sauerbrey
ISBN: 9783895782671
Format: Hardback
$158.40

Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this...  Read More >>

Information Systems Security: First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings

Information Systems Security: First International conference,...

Author: Sushil Jajodia ,  Chandan Mazumdar
ISBN: 9783540307068
Format: Paperback
$190.08

Constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS...  Read More >>

Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings

Cryptography and Coding: 10th IMA International Conference,...

Author: Nigel Smart
ISBN: 9783540302766
Format: Paperback
$221.76

Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in...  Read More >>

Access Control Systems: Security, Identity Management and Trust Models

Access Control Systems: Security, Identity Management...

Author: Messaoud Benantar
ISBN: 9780387004457
Format: Hardback
$287.76

 Read More >>

Information Security and Cryptology: First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings

Information Security and Cryptology: First SKLOIS Conference,...

Author: Dengguo Feng ,  Dongdai Lin
ISBN: 9783540308553
Format: Paperback
$205.92

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory...  Read More >>

Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II

Computational Intelligence and Security: International...

Author: Yue Hao ,  Jiming Liu
ISBN: 9783540308195
Format: Paperback
$366.96

Constitutes the refereed proceedings of the annual International Conference on Computational Intelligence and Security,...  Read More >>

Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I

Computational Intelligence and Security: International...

Author: Yue Hao ,  Jiming Liu
ISBN: 9783540308188
Format: Paperback
$366.96

Constitutes the refereed proceedings of the annual International Conference on Computational Intelligence and Security,...  Read More >>

Hacking GMail

Hacking GMail

Author: Ben Hammersley
ISBN: 9780764596117
Format: Paperback
$65.97

 Read More >>

Handbook of Information Security: Key Concepts, Infrastructure, Standards, and Protocols

Handbook of Information Security: Key Concepts, Infrastructure,...

Author: H Bidgoli
ISBN: 9780471648307
Format: Hardback
$990.00

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established...  Read More >>

Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings

Information and Communications Security: 7th International...

Author: Wenbo Mao ,  Guilin Wang
ISBN: 9783540309345
Format: Paperback
$234.96

Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997...  Read More >>

Palm and Treo Hacks

Palm and Treo Hacks

Author: Scott Machaffie
ISBN: 9780596100544
Format: Paperback
$65.87

 Read More >>

Public-Key Cryptography

Public-Key Cryptography

Author: Paul Garrett ,  Daniel Lieman
ISBN: 9780821833650
Format: Hardback
$211.20

Presents a collection of articles that grew out of an expository and tutorial conference on public-key cryptography...  Read More >>

Unconstrained Face Recognition

Unconstrained Face Recognition

Author: Shaohua Kevin Zhou ,  Rama Chellappa
ISBN: 9780387264073
Format: Hardback
$340.56

Face recognition has been actively studied over years. This work provides a comprehensive review of this biometric,...  Read More >>

Privacy Preserving Data Mining

Privacy Preserving Data Mining

Author: Jaideep Vaidya ,  Christopher W. Clifton
ISBN: 9780387258867
Format: Hardback
$353.76

Privacy preserving data mining implies the ""mining"" of knowledge from distributed data without violating the privacy...  Read More >>

Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference

Security Management, Integrity, and Internal Control...

Author: Steve Furnell ,  Paul Dowland
ISBN: 9780387298269
Format: Hardback
$393.36

 Read More >>

Progress in Cryptology - INDOCRYPT 2005: 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings

Progress in Cryptology - INDOCRYPT 2005: 6th International...

Author: Subhamoy Maitra ,  C.E. Veni Madhavan
ISBN: 9783540308058
Format: Paperback
$205.92

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List