Data encryption books

4195 books were found.

Random Curves: Journeys of a Mathematician

Random Curves: Journeys of a Mathematician

Author: Neal Koblitz
ISBN: 9783642430152
Format: Paperback
$168.16

Neal Koblitz is a co-inventor of one of the two most popular forms of encryption and digital signature, and his...  Read More >>

Post-Quantum Cryptography: 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings

Post-Quantum Cryptography: 6th International Workshop,...

Author: Michele Mosca
ISBN: 9783319116587
Format: Paperback
$145.17

The papers cover all technical aspects of cryptographic research related to the future world with large quantum...  Read More >>

Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings

Cryptographic Hardware and Embedded Systems -- CHES...

Author: Lejla Batina ,  Matthew Robshaw
ISBN: 9783662447086
Format: Paperback
$145.17

This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded...  Read More >>

Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings

Security and Cryptography for Networks: 9th International...

Author: Michel Abdalla ,  Roberto De Prisco
ISBN: 9783319108780
Format: Paperback
$145.17

This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014,...  Read More >>

Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings

Security and Trust Management: 10th International Workshop,...

Author: Sjouke Mauw ,  Christian Damsgaard Jensen
ISBN: 9783319118505
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management,...  Read More >>

Integer Algorithms in Cryptology and Information Assurance

Integer Algorithms in Cryptology and Information Assurance...

Author: Boris S Verkhovsky
ISBN: 9781322224404
Format: Electronic book text
$488.40

 Read More >>

Trusted Computing Platforms: Design and Applications

Trusted Computing Platforms: Design and Applications...

Author: Sean W. Smith
ISBN: 9781489997739
Format: Paperback
$290.37

Starting with early prototypes and proposed applications, this book surveys the longer history of amplifying small...  Read More >>

Social Engineering in IT Security: Tools, Tactics, and Techniques

Social Engineering in IT Security: Tools, Tactics, and...

Author: Sharon Conheady
ISBN: 9780071818469
Format: Paperback
$76.95

Filled with cutting-edge social engineering testing techniques that are legally and ethically sound, this book fully...  Read More >>

Healthcare Information Security and Privacy

Healthcare Information Security and Privacy

Author: Sean Murphy ,  Dennis M. Seymour
ISBN: 9780071831796
Format: Paperback
$113.95

Written by two healthcare information security and privacy experts, this definitive resource fully addresses security...  Read More >>

Authentication in Insecure Environments: Using Visual Cryptography and Non-Transferable Credentials in Practise

Authentication in Insecure Environments: Using Visual...

Author: Sebastian Pape
ISBN: 9783658071158
Format: Paperback
$145.17

 Read More >>

An Introduction to Mathematical Cryptography

An Introduction to Mathematical Cryptography

Author: Jeffrey Hoffstein ,  Jill Pipher
ISBN: 9781493917105
Format: Hardback
$237.57

 Read More >>

Securing Wireless Communications at the Physical Layer

Securing Wireless Communications at the Physical Layer...

Author: Ruoheng Liu ,  Wade Trappe
ISBN: 9781489983756
Format: Paperback
$448.77

This book focuses specifically on physical layer security, a burgeoning topic in security. It consists of contributions...  Read More >>

Algebraic Cryptanalysis

Algebraic Cryptanalysis

Author: Gregory Bard
ISBN: 9781489984500
Format: Paperback
$739.17

This book is one of the first to cover SAT-solvers and how they can be used in cryptanalysis. It includes chapters...  Read More >>

Network Security

Network Security

Author: Scott C.-H. Huang ,  David MacCallum
ISBN: 9781489990013
Format: Paperback
$316.77

Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly...  Read More >>

Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings

Communications and Multimedia Security: 15th IFIP TC...

Author: Bart De Decker ,  André Zúquete
ISBN: 9783662448847
Format: Paperback
$118.77

This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications...  Read More >>

Digital Signatures

Digital Signatures

Author: Jonathan Katz
ISBN: 9781489998811
Format: Paperback
$290.37

As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I...  Read More >>

The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook: An Introduction to Information...

Author: Umesha Nayak ,  Umesh Hodeghatta Rao
ISBN: 9781430263821
Format: Paperback
$103.47

It is intended mainly for beginners to the field of information security, written in a way that makes it easy for...  Read More >>

Information Hiding in Speech Signals for Secure Communication

Information Hiding in Speech Signals for Secure Communication...

Author: Zhijun Wu (Civil Aviation University of China, Tianjin, China)
ISBN: 9780128013281
Format: Paperback
$184.67

In the digital world, the need to protect communications increases every day. While traditional digital encryption...  Read More >>

Code Breaking in the Pacific

Code Breaking in the Pacific

Author: Peter Donovan ,  John Mack
ISBN: 9783319082776
Format: Hardback
$448.77

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence...  Read More >>

Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers

Constructive Side-Channel Analysis and Secure Design:...

Author: Emmanuel Prouff
ISBN: 9783319101743
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE...  Read More >>

Soliton Coding for Secured Optical Communication Link

Soliton Coding for Secured Optical Communication Link...

Author: Iraj Sadegh Amiri ,  Sayed Ehsan Alavi
ISBN: 9789812871602
Format: Paperback
$145.17

In the frequency domain, MRRs can be used to generate optical millimetre-wave solitons with a broadband frequency...  Read More >>

Cyber Crime and Cyber Terrorism Investigator's Handbook

Cyber Crime and Cyber Terrorism Investigator's Handbook...

Author: Babak Akhgar (Professor of Informatics, Sheffield Hallam University, Sheffield, UK) ,  Andrew Staniforth (Detective Inspector and Senior Research Fellow, CENTRIC, Sheffield Hallam University, Sheffield, UK)
ISBN: 9780128007433
Format: Paperback
$131.87

Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers,...  Read More >>

Privacy and Identity Management for Life: 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers

Privacy and Identity Management for Life: 7th IFIP WG...

Author: Jan Camenisch ,  Bruno Crispo
ISBN: 9783642433139
Format: Paperback
$145.17

The papers are organized in topical sections on privacy metrics and comparison, policies, privacy transparency in...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List