Data encryption books

4195 books were found.

NETWORKING 2012 Workshops: International IFIP TC 6 Workshops, ETICS, HetsNets, and CompNets, Held at NETWORKING 2012, Prague, Czech Republic, May 25, 2012, Proceedings

NETWORKING 2012 Workshops: International IFIP TC 6 Workshops,...

Author: Zdenek Becvar ,  Robert Bestak
ISBN: 9783642300387
Format: Paperback
$145.17

This book constitutes the refereed proceedings of three workshops colocated with NETWORKING 2012, held in Prague,...  Read More >>

Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings

Trust Management VI: 6th IFIP WG 11.11 International...

Author: Theo Dimitrakos ,  Rajat Moona
ISBN: 9783642298516
Format: Hardback
$145.17

Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary...  Read More >>

Security and Trust Management: 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers

Security and Trust Management: 7th International Workshop,...

Author: Catherine A. Meadows ,  Carmen Fernandez-Gago
ISBN: 9783642299629
Format: Paperback
$184.77

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security...  Read More >>

Cryptographic Protocol: Security Analysis Based on Trusted Freshness

Cryptographic Protocol: Security Analysis Based on Trusted...

Author: Ling Dong ,  Kefei Chen
ISBN: 9783642240720
Format: Hardback
$527.97

""Cryptographic Protocol: Security Analysis Based on Trusted Freshness"" mainly discusses how to analyze and design...  Read More >>

Information Security Technology for Applications: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers

Information Security Technology for Applications: 16th...

Author: Peeter Laud
ISBN: 9783642296147
Format: Paperback
$184.77

The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement,...  Read More >>

Mathematics of Public Key Cryptography

Mathematics of Public Key Cryptography

Author: Steven D. Galbraith (University of Auckland)
ISBN: 9781139012843
Format: Undefined
$594.00

Public key cryptography is a major interdisciplinary subject with many real-world applications. This book has been...  Read More >>

Secure Communicating Systems: Design, Analysis, and Implementation

Secure Communicating Systems: Design, Analysis, and...

Author: Michael R. A. Huth (University of London)
ISBN: 9781139164870
Format: Undefined
$1372.80

What every computer scientist ought to know about cryptographic systems, security protocols, and secure information...  Read More >>

Anonymous Security Systems and Applications

Anonymous Security Systems and Applications

Author: Shinsuke Tamura
ISBN: 9786613595690
Format: Electronic book text
$617.76

This book outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities...  Read More >>

Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings

Constructive Side-Channel Analysis and Secure Design:...

Author: Werner Schindler ,  Sorin Huss
ISBN: 9783642299117
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel...  Read More >>

Digital Identity and Access Management: Technologies and Frameworks: Technologies and Frameworks

Digital Identity and Access Management: Technologies...

Author: Raj Sharman (State University of New York, USA) ,  Sanjukta Das Smith (State University of New York-Buffalo, USA)
ISBN: 9781280561948
Format: Electronic book text
$1029.60

Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to...  Read More >>

Advances in Cryptology – EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012, Proceedings

Advances in Cryptology – EUROCRYPT 2012: 31st Annual...

Author: David Pointcheval ,  Thomas Johansson
ISBN: 9783642290107
Format: Paperback
$145.17

The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols,...  Read More >>

Critical  Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense

Critical Infrastructure Protection: Advances in Critical...

Author: Javier Lopez ,  Roberto Setola
ISBN: 9783642289194
Format: Paperback
$237.57

The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure...  Read More >>

Information Security Practice and Experience: 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings

Information Security Practice and Experience: 8th International...

Author: Mark D. Ryan ,  Ben Smyth
ISBN: 9783642291005
Format: Paperback
$145.17

The papers are organized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential...  Read More >>

The Economics of Financial and Medical Identity Theft

The Economics of Financial and Medical Identity Theft...

Author: L. Jean Camp ,  M. Eric Johnson
ISBN: 9781461419174
Format: Hardback
$145.17

Financial identity theft is well understood with clear underlying motives. The emergence of medical identity theft...  Read More >>

Black-Box Models of Computation in Cryptology

Black-Box Models of Computation in Cryptology

Author: Tibor Jager
ISBN: 9783834819895
Format: Paperback
$145.17

 Read More >>

Principles of Computer Security CompTIA Security+ and Beyond (Exam SY0-301)

Principles of Computer Security CompTIA Security+ and...

Author: Wm. Arthur Conklin ,  Gregory White
ISBN: 9780071786195
Format: Paperback
$260.96

Written by leaders in the field of IT security higher education, the new edition of this full-color text covers...  Read More >>

Transactions on Data Hiding and Multimedia Security VII

Transactions on Data Hiding and Multimedia Security...

Author: Yun Qing Shi
ISBN: 9783642286926
Format: Paperback
$145.17

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,...  Read More >>

Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers

Data Privacy Management and Autonomous Spontaneus Security:...

Author: Joaquin Garcia-Alfaro ,  Guillermo Navarro-Arribas
ISBN: 9783642288784
Format: Paperback
$145.17

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International...  Read More >>

Machine Learning and Data Mining for Computer Security: Methods and Applications

Machine Learning and Data Mining for Computer Security:...

Author: Marcus A. Maloof
ISBN: 9781849965446
Format: Paperback
$366.96

""Machine Learning and Data Mining for Computer Security"" provides an overview of the current state of research...  Read More >>

Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009, Proceedings

Trust Management III: Third IFIP WG 11.11 International...

Author: Elena Ferrari ,  Ninghui Li
ISBN: 9783642101908
Format: Paperback
$290.37

This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009,...  Read More >>

Innovations in Digital Watermarking Techniques

Innovations in Digital Watermarking Techniques

Author: Feng-Hsing Wang
ISBN: 9783642260384
Format: Paperback
$290.37

Digital watermarking is one of the widely used techniques used in the world in the area of information security.This...  Read More >>

The LLL Algorithm: Survey and Applications

The LLL Algorithm: Survey and Applications

Author: Phong Q. Nguyen ,  Brigitte Vallée
ISBN: 9783642261640
Format: Paperback
$659.97

The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean...  Read More >>

iNetSec 2009 - Open Research Problems in Network Security: IFIP Wg 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers

iNetSec 2009 - Open Research Problems in Network Security:...

Author: Jan Camenisch ,  Dogan Kesdogan
ISBN: 9783642261053
Format: Paperback
$145.17

The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP...  Read More >>

Advances in Cryptology: Proceedings of Crypto 83

Advances in Cryptology: Proceedings of Crypto 83

Author: David Chaum
ISBN: 9781468447323
Format: Paperback
$145.17

An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List