Data encryption books

4195 books were found.

Cryptology and Network Security: 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings

Cryptology and Network Security: 11th International...

Author: Josef Pieprzyk ,  Ahmad-Reza Sadeghi
ISBN: 9783642354038
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security,...  Read More >>

Comptia Security+ Certification Boxed Set (Exam Sy0-301)

Comptia Security+ Certification Boxed Set (Exam Sy0-301)...

Author: Glen Clarke ,  Daniel Lachance
ISBN: 9781299910201
Format: Electronic book text
$184.80

 Read More >>

Discrete Dynamical Systems and Chaotic Machines

Discrete Dynamical Systems and Chaotic Machines

Author: Jacques Bahi (University of Franche-Comt e, Belfort) ,  Christophe Guyeux (University of Franche-Comt e, Belfort)
ISBN: 9781299710481
Format: Undefined
$250.67

For computer scientists, especially those in the security field, the use of chaos has been limited to the computation...  Read More >>

Instant Kali Linux

Instant Kali Linux

Author: Abhinav Singh
ISBN: 9781306070522
Format: Undefined
$34.29

 Read More >>

Secret History

Secret History

Author: Craig P Bauer (York College of Pennsylvania and National Security Agency Center for Cryptologic History (2011-2012 Scholar-in-Residence), USA)
ISBN: 9781322630960
Format: Electronic book text
$189.95

Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus...  Read More >>

Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings

Cyberspace Safety and Security: 4th International Symposium,...

Author: Yang Xiang ,  Javier Lopez
ISBN: 9783642353611
Format: Paperback
$145.17

The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn...  Read More >>

Data Warehouse Management: Das St. Galler Konzept zur ganzheitlichen Gestaltung der Informationslogistik

Data Warehouse Management: Das St. Galler Konzept zur...

Author: Eitel Maur ,  Robert Winter
ISBN: 9783642624551
Format: Paperback
$158.37

Aus der Analyse bisheriger Ansätze des Data Warehousing werden in diesem Buch Lösungen für essenzielle Problemstellungen...  Read More >>

Spyware and Adware

Spyware and Adware

Author: John Aycock
ISBN: 9781461426837
Format: Paperback
$290.37

This book not only brings together current sources of information on spyware and adware but also looks at the future...  Read More >>

Trusted Systems: 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings

Trusted Systems: 4th International Conference, INTRUST...

Author: Chris J. Mitchell ,  Allan Tomlinson
ISBN: 9783642353703
Format: Paperback
$190.08

This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012,...  Read More >>

Synchronizing E-Security

Synchronizing E-Security

Author: Godfried B. Williams
ISBN: 9781461351047
Format: Paperback
$290.37

Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies...  Read More >>

CISSP All-in-One Exam Guide

CISSP All-in-One Exam Guide

Author: Shon Harris
ISBN: 9780071781749
Format: Mixed media product
$211.20

This is a comprehensive, up-to-date revision of the market-leading CISSP training resource from the #1 name in IT...  Read More >>

Computer Applications for Security, Control and System Engineering: International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings

Computer Applications for Security, Control and System...

Author: Tai-hoon Kim ,  Adrian Stoica
ISBN: 9783642352638
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech...  Read More >>

Elliptic Curves and Their Applications to Cryptography: An Introduction

Elliptic Curves and Their Applications to Cryptography:...

Author: Andreas Enge
ISBN: 9781461373728
Format: Paperback
$659.97

Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained...  Read More >>

Hacker Contest: Sicherheitsprobleme, Lösungen, Beispiele

Hacker Contest: Sicherheitsprobleme, Lösungen, Beispiele...

Author: Markus Schumacher ,  Utz Roedig
ISBN: 9783642625060
Format: Paperback
$105.57

Die Sicherheit einer IT-Komponente hängt meist direkt von einer oder mehreren anderen Komponenten ab, wobei diese...  Read More >>

Cryptography and Computational Number Theory

Cryptography and Computational Number Theory

Author: Kwok Y. Lam ,  Igor Shparlinski
ISBN: 9783034895071
Format: Paperback
$145.17

This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99,...  Read More >>

Progress in Cryptology - INDOCRYPT 2012: 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, Proceedings

Progress in Cryptology - INDOCRYPT 2012: 12th International...

Author: Steven Galbraith ,  Mridul Nandi
ISBN: 9783642349300
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT...  Read More >>

Information Systems Security: 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings

Information Systems Security: 8th International Conference,...

Author: Venkat Venkatakrishnan ,  Diganta Goswami
ISBN: 9783642351297
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security,...  Read More >>

Recent Advances in RSA Cryptography

Recent Advances in RSA Cryptography

Author: Stefan Katzenbeisser
ISBN: 9781461355502
Format: Paperback
$290.37

Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in...  Read More >>

Secure Broadcast Communication: In Wired and Wireless Networks

Secure Broadcast Communication: In Wired and Wireless...

Author: Adrian Perrig ,  J.D. Tygar
ISBN: 9781461349761
Format: Paperback
$290.37

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building...  Read More >>

Applications of Data Mining in Computer Security

Applications of Data Mining in Computer Security

Author: Daniel Barbará ,  Sushil Jajodia
ISBN: 9781461353218
Format: Paperback
$290.37

Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining...  Read More >>

Finite Fields and Applications: Proceedings of The Fifth International Conference on Finite Fields and Applications Fq 5, held at the University of Augsburg, Germany, August 2–6, 1999

Finite Fields and Applications: Proceedings of The Fifth...

Author: Dieter Jungnickel ,  H. Niederreiter
ISBN: 9783642624988
Format: Paperback
$448.77

The proceedings of the 5th International Conference on Finite Fields and Applications look at the applications of...  Read More >>

Advances in Information Technology: 5th International Conference, IAIT 2012, Bangkok, Thailand, December 6-7, 2012, Proceedings

Advances in Information Technology: 5th International...

Author: Borworn Papasratorn ,  Nipon Charoenkitkarn
ISBN: 9783642350757
Format: Paperback
$145.17

This book constitutes the proceedings of the 5th International Conference on Advances in Information Technology,...  Read More >>

Kryptographie in C und C++: Zahlentheoretische Grundlagen, Computer-Arithmetik mit großen Zahlen, kryptographische Tools

Kryptographie in C und C++: Zahlentheoretische Grundlagen,...

Author: Michael Welschenbach
ISBN: 9783642626463
Format: Paperback
$131.97

Das Buch bietet einen umfassenden Überblick über die Grundlagen moderner kryptographischer Verfahren und ihre programmtechnische...  Read More >>

Multiple Access Communications: 5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012, Proceedings

Multiple Access Communications: 5th International Workshop,...

Author: Boris Bellalta ,  Alexey Vinel
ISBN: 9783642349751
Format: Paperback
$190.08

This book constitutes the refereed proceedings of the 5th International Workshop on Multiple Access Communications,...  Read More >>

Advances in Cryptology -- ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012, Proceedings

Advances in Cryptology -- ASIACRYPT 2012: 18th International...

Author: Xiaoyun Wang ,  Kazue Sako
ISBN: 9783642349607
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List