Data encryption books

4195 books were found.

Securing Systems with the Solaris Toolkit

Securing Systems with the Solaris Toolkit

Author: Alex Noordergraaf ,  Glenn Brunette
ISBN: 9780131410718
Format: Paperback
$147.18

Providing a source for features, capabilities, how to instructions, security recommendations, and practices for...  Read More >>

Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers

Digital Rights Management: ACM CCS-9 Workshop, DRM 2002,...

Author: Joan Feigenbaum
ISBN: 9783540404101
Format: Paperback
$184.67

This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights...  Read More >>

Implementing Backup and Recovery: The Readiness Guide for the Enterprise

Implementing Backup and Recovery: The Readiness Guide...

Author: David B. Little
ISBN: 9780471227144
Format: Paperback
$118.80

The very best way to protect a company's data and make it highly available 24/7 is to correctly install, configure,...  Read More >>

Certification and Security in E-Services: From E-Government to E-Business

Certification and Security in E-Services: From E-Government...

Author: Enrico Nardelli ,  Sabina Posadziejewski
ISBN: 9781402074936
Format: Hardback
$435.60

The main purpose of the tutorial was to present and discuss an Architecture for Informa­ tion Security Management...  Read More >>

Secure Shell in the Enterprise

Secure Shell in the Enterprise

Author: Jason Reid ,  Jason Reid
ISBN: 9780131429000
Format: Paperback
$124.05

This book shows how to secure remote logins, integrate Secure Shell into existing scripts and avoid common problems....  Read More >>

Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings

Information Security and Privacy: 8th Australasian Conference,...

Author: Rei Safavi-Naini ,  Jennifer Seberry
ISBN: 9783540405153
Format: Paperback
$213.84

This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy,...  Read More >>

Secrets of Computer Espionage: Tactics and Countermeasures

Secrets of Computer Espionage: Tactics and Countermeasures...

Author: Joel McNamara
ISBN: 9780764537103
Format: Paperback
$105.60

 Read More >>

Configuring Symantec AntiVirus Enterprise Edition

Configuring Symantec AntiVirus Enterprise Edition

Author: Syngress ,  Robert Shimonski
ISBN: 9781931836814
Format: Paperback
$166.19

 Read More >>

Guide to Disaster Recovery

Guide to Disaster Recovery

Author: Michael Erbschloe ,  John R. Vacca
ISBN: 9780619131227
Format: Paperback
$353.63

 Read More >>

The CISM Prep Guide: Mastering the Five Domains of Information Security Management

The CISM Prep Guide: Mastering the Five Domains of Information...

Author: Ronald L. Krutz ,  Russell Dean Vines
ISBN: 9780471455981
Format: Paperback
$158.40

CISM (Certified Information Security Manager) exam is ISACA's new certification and is specifically geared toward...  Read More >>

Variation Principle in Informational Macrodynamics

Variation Principle in Informational Macrodynamics

Author: Vladimir S. Lerner
ISBN: 9781402074653
Format: Hardback
$356.40

Introduces the process' integral information measure, which has a distinctive difference from information approaches...  Read More >>

Security Education and Critical Infrastructures: IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26–28, 2003, Monterey, California, USA

Security Education and Critical Infrastructures: IFIP...

Author: Cynthia Irvine ,  Helen Armstrong
ISBN: 9781402074783
Format: Hardback
$446.16

Security Education and Critical Infrastructures presents the most recent developments in research and practice on...  Read More >>

Integrity and Internal Control in Information Systems V: IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11–12, 2002, Bonn, Germany

Integrity and Internal Control in Information Systems...

Author: Michael Gertz
ISBN: 9781402074738
Format: Hardback
$462.00

Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers,...  Read More >>

Security for Microsoft Visual Basic .NET

Security for Microsoft Visual Basic .NET

Author: Ed Robinson ,  Michael Bond
ISBN: 9780735619197
Format: Paperback
$131.97

 Read More >>

Managing A Network Vulnerability Assessment

Managing A Network Vulnerability Assessment

Author: Thomas R. Peltier ,  Justin Peltier
ISBN: 9780849312700
Format: Paperback
$175.00

 Read More >>

Maximizing The Enterprise Information Assets

Maximizing The Enterprise Information Assets

Author: Timothy Wells (Rochester Institute of Technology, Rochester, New York, USA) ,  Christine Sevilla (The Lumin Guild, Rochester, New York, USA)
ISBN: 9780849313479
Format: Paperback
$253.31

Defines practical techniques for building an environment that takes advantage of all of a company's information...  Read More >>

Data Warehouse Management: Das St. Galler Konzept zur ganzheitlichen Gestaltung der Informationslogistik

Data Warehouse Management: Das St. Galler Konzept zur...

Author: Eitel Maur ,  Robert Winter
ISBN: 9783540005858
Format: Hardback
$261.36

Aus der Analyse bisheriger Ansätze des Data Warehousing werden in diesem Buch Lösungen für essenzielle Problemstellungen...  Read More >>

Maximum Mac OS X Security

Maximum Mac OS X Security

Author: John Ray ,  William C. Ray
ISBN: 9780672323812
Format: Paperback
$118.77

A complete guide to securing Apple's powerful -- and complex -- UNIX-based operating system.  Read More >>

Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Intrusion Detection with SNORT: Advanced IDS Techniques...

Author: Rafeeq Ur Rehman
ISBN: 9780131407336
Format: Paperback
$118.77

Explains and simplifies various aspects of deploying and managing Snort in your network. You'll discover how to...  Read More >>

Info Security: Protectg&Case Stdies Info

Info Security: Protectg&Case Stdies Info

Author: Richard A. Spinello
ISBN: 9780131072046
Format: Paperback
$238.31

 Read More >>

Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings

Intelligence and Security Informatics: First NSF/NIJ...

Author: Hsinchun Chen ,  Richard Miranda
ISBN: 9783540401896
Format: Paperback
$224.27

Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research...  Read More >>

Stealing The Network: How to Own the Box

Stealing The Network: How to Own the Box

Author: Syngress
ISBN: 9781931836876
Format: Paperback
$137.15

 Read More >>

Data Privacy and Security

Data Privacy and Security

Author: David Salomon
ISBN: 9780387003115
Format: Hardback
$287.76

A resource and monograph for all security researchers and practitioners who want to understand and effectively use...  Read More >>

Implementing Biometric Security

Implementing Biometric Security

Author: John Chirillo ,  Scott Blaul
ISBN: 9780764525025
Format: Paperback
$171.60

 Read More >>

ExamWise CIW 1DO-470: Security Professional Exam

ExamWise CIW 1DO-470: Security Professional Exam

Author: Chad Bayer
ISBN: 9781590954072
Format: Paperback
$105.57

Part of the ExamWise to CIW Certification series, this self help and interactive exam study aid is useful for...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List