Data encryption books

4195 books were found.

Biometric User Authentication for IT Security: From Fundamentals to Handwriting

Biometric User Authentication for IT Security: From...

Author: Claus Vielhauer
ISBN: 9780387261942
Format: Hardback
$330.00

Conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned...  Read More >>

Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers

Security Protocols: 11th International Workshop, Cambridge,...

Author: Bruce Christianson ,  Bruno Crispo
ISBN: 9783540283898
Format: Paperback
$190.08

These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme...  Read More >>

Computer Security - ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings

Computer Security - ESORICS 2005: 10th European Symposium...

Author: Sabrina De Capitani di Vimercati ,  Paul Syverson
ISBN: 9783540289630
Format: Paperback
$234.96

Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean...  Read More >>

Information Security: Principles and Practice

Information Security: Principles and Practice

Author: Mark Stamp
ISBN: 9780471738480
Format: Hardback
$277.07

Your expert guide to information security As businesses and consumers become more dependent on complex multinational...  Read More >>

Digital Watermarking: 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005, Proceedings

Digital Watermarking: 4th International Workshop, IWDW...

Author: Mauro Barni ,  Ingemar Cox
ISBN: 9783540287681
Format: Paperback
$221.76

We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). IWDW...  Read More >>

Network Security Evaluation Using the NSA IEM

Network Security Evaluation Using the NSA IEM

Author: Russ Rogers (Penetration Tester for a Federal Agency and Co-founder/Chief Executive Officer, Peak Security, Inc.) ,  Ed Fuller (Information Systems Management from the University of Maryland, University College, USA)
ISBN: 9781597490351
Format: Paperback
$166.19

Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical...  Read More >>

Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings

Secure Data Management: Second VLDB Workshop, SDM 2005,...

Author: Willem Jonker ,  Milan Petkovic
ISBN: 9783540287988
Format: Paperback
$166.32

Constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM...  Read More >>

Stedman's Guide to the HIPAA Privacy Rule

Stedman's Guide to the HIPAA Privacy Rule

Author: Kathy Rockel
ISBN: 9780781763011
Format: Paperback
$113.39

Aimed at medical transcription students and professionals, this book covers legal issues surrounding the HIPAA Privacy...  Read More >>

Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings

Cryptographic Hardware and Embedded Systems - CHES 2005:...

Author: Josyula R. Rao ,  Berk Sunar
ISBN: 9783540284741
Format: Paperback
$261.36

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems,...  Read More >>

Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Extreme Exploits: Advanced Defenses Against Hardcore...

Author: Victor Oppleman ,  Oliver Friedrichs
ISBN: 9780072259551
Format: Paperback
$145.07

Explains how to defend against vulnerabilities in systems and underlying network infrastructure. This book features...  Read More >>

Rootkits: Subverting the Windows Kernel

Rootkits: Subverting the Windows Kernel

Author: Greg Hoglund ,  Jamie Butler
ISBN: 9780321294319
Format: Paperback
$158.37

Intended for those working in the field of cyber-security, this book helps the readers understand the growing threat...  Read More >>

Spyware

Spyware

Author: John S Yang
ISBN: 9781594546488
Format: Hardback
$181.10

 Read More >>

Encyclopedia of Cryptography and Security

Encyclopedia of Cryptography and Security

Author: Henk C.A. van Tilborg
ISBN: 9780387234731
Format: Paperback
$921.36

Provides easy access to information on various aspects of cryptography and security. This work covers subject areas...  Read More >>

Codici cifrati: Arne Beurling e la crittografia nella II guerra mondiale

Codici cifrati: Arne Beurling e la crittografia nella...

Author: Bengt Beckman
ISBN: 9788847003163
Format: Paperback
$52.77

 Read More >>

Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (TEISMES)

Impacts and Risk Assessment of Technology for Internet...

Author: Charles A. Shoniregun
ISBN: 9780387243436
Format: Hardback
$287.76

This study investigates the impacts and risk assessment of technology-ena­ bled information (TET), v^hich are engaged...  Read More >>

Basics of Contemporary Cryptography for It Practitioners. Series on Coding Theory and Cryptology, Volume 1.

Basics of Contemporary Cryptography for It Practitioners....

Author: Boris Ryabko ,  Andrey Fionov
ISBN: 9786611372910
Format: Electronic book text
$475.20

The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical...  Read More >>

Hacking Digital Cameras

Hacking Digital Cameras

Author: Chieh Cheng ,  Auri Rahimzadeh
ISBN: 9780764596513
Format: Paperback
$65.97

 Read More >>

Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings

Data and Applications Security XIX: 19th Annual IFIP...

Author: Sushil Jajodia ,  Duminda Wijesekera
ISBN: 9783540281382
Format: Paperback
$269.28

Constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held...  Read More >>

Mapping Hacks

Mapping Hacks

Author: Schuyler Erle ,  Rich Gibson
ISBN: 9780596007034
Format: Paperback
$79.07

 Read More >>

IM Instant Messaging Security

IM Instant Messaging Security

Author: John Rittinghouse, PhD, CISM (SVP, Professional Security Services at SecureInfo Corporation in San Antonio, TX) ,  James F. Ransome, PhD, CISM, CISSP (James F. Ransome, Ph.D., CISSP, CISM,SVP, Managed Security Services)
ISBN: 9781555583385
Format: Paperback
$200.51

Includes a coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security....  Read More >>

Networks, Security and Complexity: The Role of Public Policy in Critical Infrastructure Protection

Networks, Security and Complexity: The Role of Public...

Author: Sean P. Gorman
ISBN: 9781843769521
Format: Hardback
$241.35

The author provides the economic, policy, and physics background to the issues of infrastructure security, along...  Read More >>

The Database Hacker's Handbook: Defending Database Servers

The Database Hacker's Handbook: Defending Database Servers...

Author: David Litchfield ,  Chris Anley
ISBN: 9780764578014
Format: Paperback
$82.95

Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical...  Read More >>

Financial Cryptography and Data Security: 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005, Revised Papers

Financial Cryptography and Data Security: 9th International...

Author: Andrew S. Patrick ,  Moti Yung
ISBN: 9783540266563
Format: Paperback
$198.00

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth...  Read More >>

Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security

Bulletproof Wireless Security: GSM, UMTS, 802.11, and...

Author: Praphul Chandra (Texas Instruments, Germantown, MD, USA)
ISBN: 9780750677462
Format: Paperback
$171.47

A guide to effective security for both voice and data wireless networks. It offers the conceptual and practical...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List