Data encryption books

4195 books were found.

Cryptography for Developers

Cryptography for Developers

Author: Tom St Denis ,  Tom St Denis
ISBN: 9781281071859
Format: Electronic book text
$199.43

Acts as a guide for software developers who must learn and implement cryptography. Introducing the subject of cryptography,...  Read More >>

Essential PHP Security

Essential PHP Security

Author: Chris Shiflett
ISBN: 9780596006563
Format: Paperback
$79.07

 Read More >>

Enhancing Computer Security with Smart Technology

Enhancing Computer Security with Smart Technology

Author: V. Rao Vemuri ,  V. Rao Vemuri
ISBN: 9780849330452
Format: Hardback
$180.00

Introduces the problems of computer security to researchers with a machine learning background. This book introduces...  Read More >>

Understanding Intrusion Detection through Visualization

Understanding Intrusion Detection through Visualization...

Author: Stefan Axelsson ,  David Sands
ISBN: 9780387276342
Format: Hardback
$287.76

In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating...  Read More >>

Physical Security Systems Handbook: The Design and Implementation of Electronic Security Systems

Physical Security Systems Handbook: The Design and Implementation...

Author: Michael Khairallah (President, Security Design Solutions L.L.C., Covington LA, USA)
ISBN: 9780750678506
Format: Hardback
$160.91

Intends to assist the security professional in identifying what systems are required to meet security needs as defined...  Read More >>

Absolute Beginner's Guide to Security, Spam, Spyware & Viruses

Absolute Beginner's Guide to Security, Spam, Spyware...

Author: Andy Walker
ISBN: 9780789734594
Format: Paperback
$71.25

Including easy-to-understand definitions of viruses, spyware, and hackers, this book helps you understand what you're...  Read More >>

Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking

Author: Borko Furht ,  Edin Muharemagic
ISBN: 9780387244259
Format: Hardback
$366.96

Presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques. This book also...  Read More >>

Hop Integrity in the Internet

Hop Integrity in the Internet

Author: Chin-Tser Huang ,  Mohamed G. Gouda
ISBN: 9780387244266
Format: Hardback
$237.47

The protocols include:- Secure address resolution - Weak hop integrity - Strong hop integrity using soft sequence...  Read More >>

Managing Cybersecurity Resources

Managing Cybersecurity Resources

Author: Lawrence Gordon ,  Martin Loeb
ISBN: 9780071452854
Format: Hardback
$105.47

Breaches in cybersecurity are on the rise. Between 1998 and 2003, reported cybersecurity incidents increased over...  Read More >>

Advances in Digital Forensics: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005

Advances in Digital Forensics: IFIP International Conference...

Author: Mark Pollitt ,  Sujeet Shenoi
ISBN: 9780387300122
Format: Hardback
$488.40

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic...  Read More >>

Enterprise Security Architecture: A Business-Driven Approach

Enterprise Security Architecture: A Business-Driven...

Author: Nicholas Sherwood (Consultant, Anaesthesia and Critical Care Medicine, City Hospital, Birmimgham, UK) ,  Andrew Clark
ISBN: 9781578203185
Format: Hardback
$221.00

Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire...  Read More >>

Quantum Communications and Cryptography

Quantum Communications and Cryptography

Author: Alexander V. Sergienko
ISBN: 9780849336843
Format: Hardback
$347.00

 Read More >>

Penetration Testing and Network Defense

Penetration Testing and Network Defense

Author: Andrew Whitaker ,  Daniel Newman
ISBN: 9781587052088
Format: Paperback
$182.16

A practical guide to simulating, detecting, and responding to network attacks. This book offers steps on how to...  Read More >>

Contemporary Security Management

Contemporary Security Management

Author: John Fay (former Director of National Crime Prevention Institute, Atlanta, GA, USA) ,  John Fay (former Director of National Crime Prevention Institute, Atlanta, GA, USA)
ISBN: 9780750679282
Format: Hardback
$192.59

Designed to provide the facts on modern practices to efficiently and effectively run a security department, this...  Read More >>

CSS in Easy Steps

CSS in Easy Steps

Author: Mike McGrath
ISBN: 9781840783018
Format: Paperback
$39.57

Shows you how to create exciting web pages using Cascading Style Sheets (CSS) for presentation and dynamic effect...  Read More >>

Managing Information Systems Security and Privacy

Managing Information Systems Security and Privacy

Author: Denis Trcek
ISBN: 9783540281030
Format: Hardback
$340.56

The book deals with the management of information systems security and privacy, based on a model that covers technological,...  Read More >>

Configuring Check Point NGX VPN-1/Firewall-1

Configuring Check Point NGX VPN-1/Firewall-1

Author: Barry J Stiefel (Founder and President of CPUG, The Check Point User Group (www.cpug.org)) ,  Simon Desmeules (Independent security perimeter specialist)
ISBN: 9781597490313
Format: Paperback
$137.15

Protect your network from both internal and external threats. Check Point NGX VPN-1/Firewall-1 is a Check Point's...  Read More >>

The Case for ISO 27001

The Case for ISO 27001

Author: Alan Calder
ISBN: 9781905356133
Format: Paperback
$79.07

Written by a business manager, this book sets out why ISO 27001 is the right answer to the information security...  Read More >>

Web and Information Security

Web and Information Security

Author: Elena Ferrari ,  Bhavani M. Thuraisingham
ISBN: 9781591405887
Format: Hardback
$193.95

Covering basic concepts of Web and information system security, this book provides insights into the semantic Web...  Read More >>

Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

Core Security Patterns: Best Practices and Strategies...

Author: Christopher Steel ,  Ramesh Nagappan
ISBN: 9780131463073
Format: Hardback
$184.77

A guide to building robust end-to-end security into J2EE enterprise applications, Web services, identity management,...  Read More >>

The HIPAA Compliance Kit: Understanding and Applying the Regulations in Psychotherapeutic Practice

The HIPAA Compliance Kit: Understanding and Applying...

Author: Ofer Zur
ISBN: 9780976101505
Format: Mixed media product
$182.16

New medical privacy rules (HIPAA) are having a profound impact on all medical practices.  Read More >>

Computer Forensics: Computer Crime Scene Investigation

Computer Forensics: Computer Crime Scene Investigation...

Author: John R. Vacca
ISBN: 9788170083412
Format: Paperback
$72.42

 Read More >>

Net-Centric Approaches to Intelligence and National Security

Net-Centric Approaches to Intelligence and National...

Author: Roy Ladner ,  Frederick E. Petry
ISBN: 9780387242958
Format: Hardback
$303.60

In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations...  Read More >>

Computer Insecurity: Risking the System

Computer Insecurity: Risking the System

Author: Steven M. Furnell
ISBN: 9781852339432
Format: Paperback
$184.67

 Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List