Data encryption books

4195 books were found.

Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference 22–27 August 2004 Toulouse, France

Security and Protection in Information Processing Systems:...

Author: Yves Deswarte ,  Frederic Cuppens
ISBN: 9781475780161
Format: Paperback
$145.17

Security is probably the most critical factor for the development of the Information Society. E-government, e-commerce,...  Read More >>

Quantum Attacks on Public-Key Cryptosystems

Quantum Attacks on Public-Key Cryptosystems

Author: Song Y. Yan
ISBN: 9781441977212
Format: Hardback
$261.36

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the...  Read More >>

Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

Intrusion Detection in Distributed Systems: An Abstraction-Based...

Author: Peng Ning ,  Sushil Jajodia
ISBN: 9781461350910
Format: Paperback
$145.17

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three...  Read More >>

Integrity and Internal Control in Information Systems VI: IFIP TC11 / WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13–14 November 2003, Lausanne, Switzerland

Integrity and Internal Control in Information Systems...

Author: Sushil Jajodia ,  Leon Strous
ISBN: 9781475788648
Format: Paperback
$290.37

The development and integration of integrity and internal control mechanisms into information system infrastructures...  Read More >>

Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings

Information Security Theory and Practice. Security of...

Author: Lorenzo Cavallaro ,  Dieter Gollmann
ISBN: 9783642385292
Format: Paperback
$145.17

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security...  Read More >>

Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

Security and Trust Management: 8th International Workshop,...

Author: Audun Jøsang ,  Pierangela Samarati
ISBN: 9783642380037
Format: Paperback
$116.41

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security...  Read More >>

Information Security Practice and Experience: 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings

Information Security Practice and Experience: 9th International...

Author: Robert H. Deng ,  Tao Feng
ISBN: 9783642380327
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice...  Read More >>

Information Security and Cryptology -- ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

Information Security and Cryptology -- ICISC 2012: 15th...

Author: Taekyoung Kwon ,  Mun-Kyu Lee
ISBN: 9783642376818
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on...  Read More >>

Beyond Fear: Thinking Sensibly About Security in an Uncertain World

Beyond Fear: Thinking Sensibly About Security in an...

Author: Bruce Schneier
ISBN: 9781475781199
Format: Paperback
$131.97

With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that...  Read More >>

Trusted Information: The New Decade Challenge

Trusted Information: The New Decade Challenge

Author: Michel Dupuy ,  Pierre Paradinas
ISBN: 9781475775365
Format: Paperback
$580.77

Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure...  Read More >>

Radio Frequency Identification: Security and Privacy Issues: 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers

Radio Frequency Identification: Security and Privacy...

Author: Jaap-Henk Hoepman ,  Ingrid Verbauwhede
ISBN: 9783642361395
Format: Paperback
$131.97

This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency...  Read More >>

Information Security Management & Small Systems Security: IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30–October 1, 1999, Amsterdam, The Netherlands

Information Security Management & Small Systems Security:...

Author: Jan H.P. Eloff ,  Les Labuschagne
ISBN: 9781475754834
Format: Paperback
$448.77

The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security), jointly...  Read More >>

Smart Card Research and Advanced Applications: 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers

Smart Card Research and Advanced Applications: 11th...

Author: Stefan Mangard
ISBN: 9783642372872
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on...  Read More >>

Computational Number Theory

Computational Number Theory

Author: Abhijit Das
ISBN: 9781439866153
Format: Hardback
$221.00

This text introduces the vast and fascinating area of computational number theory. It treats algorithms for common...  Read More >>

Public Key Cryptography: Applications and Attacks

Public Key Cryptography: Applications and Attacks

Author: Lynn Margaret Batten
ISBN: 9781118317129
Format: Hardback
$172.95

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use,...  Read More >>

Research Directions in Data and Applications Security: IFIP TC11 / WG11.3 Sixteenth Annual Conference on Data and Applications Security July 28–31, 2002, Cambridge, UK

Research Directions in Data and Applications Security:...

Author: Ehud Gudes ,  Sujeet Shenoi
ISBN: 9781475764130
Format: Paperback
$290.37

Research Directions in Data and Applications Security describes original research results and innovative practical...  Read More >>

Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26–28, 2003, Athens, Greece

Security and Privacy in the Age of Uncertainty: IFIP...

Author: Sabrina de Capitani di Vimercati ,  Pierangela Samarati
ISBN: 9781475764895
Format: Paperback
$290.37

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a...  Read More >>

Principles of Security and Trust: Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings

Principles of Security and Trust: Second International...

Author: David Basin ,  John C. Mitchell
ISBN: 9783642368295
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the Second International Conference on Principles of Security...  Read More >>

Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings

Information and Communication Technology: International...

Author: Khabib Mustofa ,  Erich Neuhold
ISBN: 9783642368172
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the International Conference on Information and Communication...  Read More >>

Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers

Security and Privacy in Communication Networks: 8th...

Author: Angelos D. Keromytis ,  Roberto Di Pietro
ISBN: 9783642368820
Format: Paperback
$116.41

This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in...  Read More >>

Pairing-Based Cryptography -- Pairing 2012: 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers

Pairing-Based Cryptography -- Pairing 2012: 5th International...

Author: Michel Abdalla ,  Tanja Lange
ISBN: 9783642363337
Format: Paperback
$145.17

The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track...  Read More >>

Information Hiding: 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers

Information Hiding: 14th International Conference, IH...

Author: Matthias Kirchner ,  Dipak Ghosal
ISBN: 9783642363726
Format: Paperback
$131.97

This book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference,...  Read More >>

Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings

Theory of Cryptography: 10th Theory of Cryptography...

Author: Amit Sahai
ISBN: 9783642365935
Format: Paperback
$145.17

This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013,...  Read More >>

Engineering Secure Software and Systems: 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings

Engineering Secure Software and Systems: 5th International...

Author: Jan Jürjens ,  Ben Livshits
ISBN: 9783642365621
Format: Paperback
$190.08

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software...  Read More >>

Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany

Communications and Multimedia Security Issues of the...

Author: Ralf Steinmetz ,  Jana Dittmann
ISBN: 9781475748116
Format: Paperback
$580.77

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List