Data encryption books

4195 books were found.

Integrated Research in Steganography

Integrated Research in Steganography

Author: Audrey Coon
ISBN: 9781632403131
Format: Hardback
$197.87

Steganography involves the art of concealing one message or data file within another. Stenographic technologies...  Read More >>

Cyber Espionage: Cryptology

Cyber Espionage: Cryptology

Author: Adem Cetinkaya
ISBN: 9781978302600
Format: Paperback
$132.00

Espionage (colloquially, spying) is the obtaining of secret orconfidential information without the permission of...  Read More >>

Hacking Back: Offensive Cyber Counterintelligence

Hacking Back: Offensive Cyber Counterintelligence

Author: Sean Bodmer ,  Gregory Carpenter
ISBN: 9780071827744
Format: Paperback
$106.06

Offensive cyber counterintelligence concepts, methods, and implications in a post-Edward Snowden world  Read More >>

Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers

Information Security Applications: 15th International...

Author: Kyung-Hyune Rhee ,  Jeong Hyun Yi
ISBN: 9783319150864
Format: Paperback
$145.17

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security...  Read More >>

Construction and Analysis of Cryptographic Functions

Construction and Analysis of Cryptographic Functions...

Author: Lilya Budaghyan
ISBN: 9783319129907
Format: Hardback
$290.37

 Read More >>

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

A Practical Guide to TPM 2.0: Using the Trusted Platform...

Author: Will Arthur ,  David Challener
ISBN: 9781430265832
Format: Paperback
$118.77

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward...  Read More >>

Trusted Computing Platforms: TPM2.0 in Context

Trusted Computing Platforms: TPM2.0 in Context

Author: Graeme Proudler ,  Liqun Chen
ISBN: 9783319087436
Format: Hardback
$475.17

In this book the authors first describe the background of trusted platforms and trusted computing and speculate...  Read More >>

Cyber Defense and Situational Awareness

Cyber Defense and Situational Awareness

Author: Alexander Kott ,  Cliff Wang
ISBN: 9783319113906
Format: Hardback
$290.37

It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of...  Read More >>

Attribute-based Credentials for Trust: Identity in the Information Society

Attribute-based Credentials for Trust: Identity in the...

Author: Kai Rannenberg ,  Jan Camenisch
ISBN: 9783319144382
Format: Hardback
$290.37

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard,...  Read More >>

The Hash Function BLAKE

The Hash Function BLAKE

Author: Jean-Philippe Aumasson ,  Willi Meier
ISBN: 9783662447567
Format: Hardback
$263.97

It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using...  Read More >>

Applications of Cryptography and Network Security

Applications of Cryptography and Network Security

Author: Stephen Mason
ISBN: 9781632400659
Format: Hardback
$395.87

Cryptography is the essential and efficient ingredient to the recipe of security solutions. With the arrival of...  Read More >>

SOFSEM 2015: Theory and Practice of Computer Science: 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Sněžkou, Czech Republic, January 24-29, 2015, Proceedings

SOFSEM 2015: Theory and Practice of Computer Science:...

Author: Giuseppe Italiano ,  Tiziana Margaria-Steffen
ISBN: 9783662460771
Format: Paperback
$145.17

This book constitutes the proceedings of the 41st International Conference on Current Trends in Theory and Practice...  Read More >>

Handbook of Research on Emerging Developments in Data Privacy

Handbook of Research on Emerging Developments in Data...

Author: Manish Gupta
ISBN: 9781466673816
Format: Hardback
$837.95

Brings together new ideas on how to deal with potential leaks of valuable customer information. Highlighting the...  Read More >>

The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web

The Manager's Guide to Web Application Security: A Concise...

Author: Ron Lepofsky
ISBN: 9781484201497
Format: Paperback
$263.97

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks...  Read More >>

Guide to Cloud Computing: Principles and Practice

Guide to Cloud Computing: Principles and Practice

Author: Richard Hill ,  Laurie Hirsch
ISBN: 9781447158288
Format: Paperback
$145.17

 Read More >>

E-Government, E-Services and Global Processes: Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings

E-Government, E-Services and Global Processes: Joint...

Author: Marijn Janssen ,  Winfried Lamersdorf
ISBN: 9783642422911
Format: Paperback
$145.17

Constitutes the refereed proceedings of the IFIP TC 8 International Conference on E-Government and E-Services, EGES...  Read More >>

Selected Areas in Cryptography -- SAC 2014: 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers

Selected Areas in Cryptography -- SAC 2014: 21st International...

Author: Antoine Joux ,  Amr Youssef
ISBN: 9783319130507
Format: Paperback
$145.17

This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC...  Read More >>

Practical Hadoop Security

Practical Hadoop Security

Author: Bhushan Lakhe
ISBN: 9781430265443
Format: Paperback
$131.97

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want...  Read More >>

Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers

Security Protocols XVIII: 18th International Workshop,...

Author: Bruce Christianson ,  James Malcolm
ISBN: 9783662459201
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security...  Read More >>

CISSP Guide to Security Essentials

CISSP Guide to Security Essentials

Author: Peter Gregory (Manager of information security and risk management at Concur, a Redmond, WA based provider of on-demand Employee Spend Management services)
ISBN: 9781285060422
Format: Paperback
$369.47

Provides complete, focused coverage to prepare students and professionals alike for success on the Certified Information...  Read More >>

Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom

Communications and Multimedia Security: 8th IFIP TC-6...

Author: David Chadwick ,  Bart Preneel
ISBN: 9781461498933
Format: Paperback
$290.37

Presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security,...  Read More >>

Sequences and Their Applications - SETA 2014: 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings

Sequences and Their Applications - SETA 2014: 8th International...

Author: Kai-Uwe Schmidt ,  Arne Winterhof
ISBN: 9783319123240
Format: Paperback
$145.17

The papers have been organized in topical sections on Boolean functions, perfect sequences, correlation of arrays,...  Read More >>

Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers

Radio Frequency Identification: Security and Privacy...

Author: Nitesh Saxena ,  Ahmad-Reza Sadeghi
ISBN: 9783319130651
Format: Paperback
$103.47

This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014,...  Read More >>

Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings

Security Standardisation Research: First International...

Author: Liqun Chen ,  Chris Mitchell
ISBN: 9783319140537
Format: Paperback
$145.17

This book constitutes the proceedings of the First International Conference on Security Standardisation Research,...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List