Data encryption books

4195 books were found.

Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium

Secure Information Networks: Communications and Multimedia...

Author: Bart Preneel
ISBN: 9781475764871
Format: Paperback
$580.77

This volume contains papers presented at the fourth working conference on Communications and Multimedia Security...  Read More >>

Computational Number Theory and Modern Cryptography

Computational Number Theory and Modern Cryptography...

Author: Song Y. Yan (Massachusetts Institute of Technology, USA)
ISBN: 9781118188583
Format: Hardback
$157.95

* Makes deep mathematical problems accessible to computer scientists and engineers * Based on classroom tested...  Read More >>

Trustworthy Computing and Services: International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers

Trustworthy Computing and Services: International Conference,...

Author: Yuyu Yuan ,  Xu Wu
ISBN: 9783642357947
Format: Paperback
$290.37

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed...  Read More >>

Public-Key Cryptography -- PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, Feburary 26 -- March 1, 2013, Proceedings

Public-Key Cryptography -- PKC 2013: 16th International...

Author: Kaoru Kurosawa ,  Goichiro Hanaoka
ISBN: 9783642363610
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key...  Read More >>

Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers

Data Privacy Management and Autonomous Spontaneous Security:...

Author: Roberto Di Pietro ,  Javier Herranz
ISBN: 9783642358890
Format: Paperback
$145.17

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International...  Read More >>

Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers

Security Protocols XVII: 17th International Workshop,...

Author: Bruce Christianson ,  James A. Malcolm
ISBN: 9783642362125
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols,...  Read More >>

PRAGMATIC Security Metrics: Applying Metametrics to Information Security

PRAGMATIC Security Metrics: Applying Metametrics to...

Author: W. Krag Brotby, CISM ,  Gary Hinson
ISBN: 9781439881521
Format: Hardback
$252.00

Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics...  Read More >>

Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers

Selected Areas in Cryptography: 19th International Conference,...

Author: Lars R. Knudsen ,  Huapeng Wu
ISBN: 9783642359989
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on...  Read More >>

Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings

Topics in Cryptology - CT- RSA 2013: The Cryptographer`s...

Author: Ed Dawson
ISBN: 9783642360947
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013,...  Read More >>

Guide to Network Defense and Countermeasures

Guide to Network Defense and Countermeasures

Author: Randy Weaver (Everst College, Arizona) ,  Dawn Weaver
ISBN: 9781133727941
Format: Paperback
$142.29

GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including...  Read More >>

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

Securing Critical Infrastructures and Critical Control...

Author: Christopher Laing ,  Atta Badii
ISBN: 9781466626591
Format: Hardback
$415.95

The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial,...  Read More >>

Encryption for Digital Content

Encryption for Digital Content

Author: Aggelos Kiayias ,  Serdar Pehlivanoglu
ISBN: 9781461427216
Format: Paperback
$290.37

Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray...  Read More >>

Selected Areas in Cryptography

Selected Areas in Cryptography

Author: Evangelos Kranakis ,  Paul C. van Oorschot
ISBN: 9781461375081
Format: Paperback
$290.37

Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results...  Read More >>

Security in the Information Society: Visions and Perspectives

Security in the Information Society: Visions and Perspectives...

Author: M. Adeeb Ghonaimy ,  Mahmoud T. El-Hadidi
ISBN: 9781475710267
Format: Paperback
$448.77

Addressing the various security issues confronting our Information Society, this title covers the following topics:...  Read More >>

Encyclopedia of Biometrics

Encyclopedia of Biometrics

Author: Stan Z. Li (Chinese Academy of Sciences) ,  Anil K. Jain
ISBN: 9780387730042
Format: Mixed media product
$1475.76

This is a comprehensive reference to topics in Biometrics, including concepts, modalities, algorithms, devices,...  Read More >>

Recommendation for Cryptographic Key Generation NIST SP 800-133: NiST SP 800-133

Recommendation for Cryptographic Key Generation NIST...

Author: National Institute of Standards and Tech
ISBN: 9781979931311
Format: Paperback
$42.50

NIST SP 800-133 Cryptography is often used in an information technology security environment to protect data that...  Read More >>

Preserving Privacy in Data Outsourcing

Preserving Privacy in Data Outsourcing

Author: Sara Foresti
ISBN: 9781461426998
Format: Paperback
$290.37

To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to...  Read More >>

Computer Applications for Bio-Technology, Multimedia and Ubiquitous City: Proceedings

Computer Applications for Bio-Technology, Multimedia...

Author: Tai-hoon Kim ,  Jeong Jin Kang
ISBN: 9783642355202
Format: Paperback
$186.30

 Read More >>

Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers

Financial Cryptography and Data Security: FC 2012 Workshops,...

Author: Jim Blythe
ISBN: 9783642346378
Format: Paperback
$131.97

This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC...  Read More >>

Managing Trust in Cyberspace

Managing Trust in Cyberspace

Author: Sabu M Thampi (Trivandrum, India) ,  Sabu M Thampi (Trivandrum, India)
ISBN: 9781306180191
Format: Undefined
$277.07

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect...  Read More >>

Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers

Security Protocols XX: 20th International Workshop,...

Author: Bruce Christianson ,  James Malcolm
ISBN: 9783642356933
Format: Paperback
$131.97

This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security...  Read More >>

An Introduction to Data Structures and Algorithms

An Introduction to Data Structures and Algorithms

Author: J.A. Storer ,  John C. Cherniavsky
ISBN: 9781461266013
Format: Paperback
$145.17

* Sorting, often perceived as rather technical, is not treated as a separate chapter, but is used in many examples...  Read More >>

Guide to Cloud Computing: Principles and Practice

Guide to Cloud Computing: Principles and Practice

Author: Richard Hill ,  Laurie Hirsch
ISBN: 9781447146025
Format: Hardback
$145.17

This book describes the landscape of cloud computing from first principles, leading the reader step-by-step through...  Read More >>

Information Security Applications: 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers

Information Security Applications: 13th International...

Author: Dong Hoon Lee ,  Moti Yung
ISBN: 9783642354151
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List