Data encryption books

4195 books were found.

Technology and Practice of Passwords: International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers

Technology and Practice of Passwords: International...

Author: Stig F. Mjølsnes
ISBN: 9783319241913
Format: Paperback
$90.54

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on...  Read More >>

Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings

Security and Trust Management: 11th International Workshop,...

Author: Sara Foresti
ISBN: 9783319248578
Format: Paperback
$103.47

This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management,...  Read More >>

Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings

Provable Security: 9th International Conference, ProvSec...

Author: Man-Ho Au ,  Atsuko Miyaji
ISBN: 9783319260587
Format: Paperback
$116.41

This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec...  Read More >>

Time Delay Measurements of Key Generation Process on Smart Cards

Time Delay Measurements of Key Generation Process on...

Author: Penny Hill Press Inc ,  Naval Postgraduate School
ISBN: 9781522955399
Format: Paperback
$34.19

Smart card transaction times will increase as the number of bits used in the algorithms protecting the cards to...  Read More >>

CryptoSchool

CryptoSchool

Author: Joachim von zur Gathen
ISBN: 9783662484234
Format: Hardback
$118.77

 Read More >>

Cryptography: Questions and Answers

Cryptography: Questions and Answers

Author: George a Duckett
ISBN: 9781522820666
Format: Paperback
$39.60

If you have a question about Cryptography this is the book with the answers. Cryptography: Questions and Answers...  Read More >>

Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings

Cryptology and Network Security: 14th International...

Author: Michael Reiter ,  David Naccache
ISBN: 9783319268224
Format: Paperback
$103.47

This book constitutes the refereed proceedingsof the 14th International Conference on Cryptology and Network Security,...  Read More >>

Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings

Security Standardisation Research: Second International...

Author: Liqun Chen ,  Shin'ichiro Matsuo
ISBN: 9783319271514
Format: Paperback
$103.47

This bookconstitutes the refereed proceedings of the Second International Conference onSecurity Standardisation...  Read More >>

Cryptography and Coding: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings

Cryptography and Coding: 15th IMA International Conference,...

Author: Jens Groth
ISBN: 9783319272382
Format: Paperback
$116.41

This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC...  Read More >>

Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers

Advances in Digital Forensics XI: 11th IFIP WG 11.9...

Author: Gilbert Peterson ,  Sujeet Shenoi
ISBN: 9783319241227
Format: Hardback
$145.17

 Read More >>

Cryptography Made Simple

Cryptography Made Simple

Author: Nigel Smart
ISBN: 9783319219356
Format: Hardback
$116.41

He takes a modern approach, where defining what is meant by ""secure"" is as important as creating something that...  Read More >>

Gut gerüstet gegen Überwachung im Web: Wie Sie verschlüsselt mailen, chatten und surfen

Gut gerüstet gegen Überwachung im Web: Wie Sie verschlüsselt...

Author: Christina Czeschik ,  Matthias Lindhorst
ISBN: 9783527760619
Format: Paperback
$26.75

Schnelle und einfache Schutzmaßnahmen gegen NSA , BN D, kriminelle Hacker und kommerzielle Datenkraken Sie möchten...  Read More >>

Advanced Concepts for Intelligent Vision Systems: 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings

Advanced Concepts for Intelligent Vision Systems: 16th...

Author: Sebastiano Battiato ,  Jacques Blanc-Talon
ISBN: 9783319259024
Format: Paperback
$116.41

This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts...  Read More >>

Secure Wireless Sensor Networks: Threats and Solutions

Secure Wireless Sensor Networks: Threats and Solutions...

Author: Mauro Conti
ISBN: 9781493934584
Format: Hardback
$145.17

 Read More >>

Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings

Information Security Theory and Practice: 9th IFIP WG...

Author: Raja Naeem Akram ,  Sushil Jajodia
ISBN: 9783319240176
Format: Paperback
$116.41

This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop)...  Read More >>

Secure IT Systems: 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings

Secure IT Systems: 20th Nordic Conference, NordSec 2015,...

Author: Sonja Buchegger ,  Mads Dam
ISBN: 9783319265018
Format: Paperback
$103.47

Thisbook constitutes the proceedings of the 20th Nordic Conference on Secure ITSystems, held in Stockholm, Sweden,...  Read More >>

Mathematical Foundations of Public Key Cryptography

Mathematical Foundations of Public Key Cryptography...

Author: Xiaoyun Wang ,  Guangwu Xu
ISBN: 9781498702232
Format: Hardback
$164.00

Based on the research experience of the authors, this book provides a theoretical structure of fundamental number...  Read More >>

Dynamic Secrets in Communication Security

Dynamic Secrets in Communication Security

Author: Sheng Xiao ,  Weibo Gong
ISBN: 9781493902293
Format: Paperback
$145.17

 Read More >>

Shishi - Kerberos 5 Implementation

Shishi - Kerberos 5 Implementation

Author: Simon Josefsson
ISBN: 9789888381777
Format: Paperback
$79.17

Shishi is an implementation of the Kerberos 5 network authentication system, as specified in RFC 4120. Shishi can...  Read More >>

GNU GSS Library: Generic Security Service

GNU GSS Library: Generic Security Service

Author: Simon Josefsson
ISBN: 9789888381661
Format: Paperback
$52.77

GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used...  Read More >>

GnuTLS Reference Manual

GnuTLS Reference Manual

Author: Simon Josefsson ,  Daiki Ueno
ISBN: 9789888381647
Format: Paperback
$79.17

GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them....  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List