Data Encryption
-
Sold out
Mathematical Foundations of Public Key Cryptography
Guangwu Xu€52.99In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience...
View full details€52.99Sold out -
Sold out
Reinforcement Learning for Cyber Operations
Abdul Rahman€114.99A comprehensive and up-to-date application of reinforcement learning concepts to offensive and defensive cybersecurity In Reinforcement Learning fo...
View full details€114.99Sold out -
Sold out
Defending the Digital Frontier
Ernst & Young LLP€28.50Enhance the digital security knowledge-base within any organization In today's competitive business environment, information and information techno...
View full details€28.50Sold out -
Sold out
Gut gerüstet gegen Überwachung im Web
Christina Czeschik€16.99Schnelle und einfache Schutzmaßnahmen gegen NSA , BN D, kriminelle Hacker und kommerzielle Datenkraken Sie möchten nicht, dass jemand Ihre E-Mails ...
View full details€16.99Sold out -
Sold out
Coding Theory And Cryptology
Harald Niederreiter€52.99The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December ...
View full details€52.99Sold out -
Sold out
Secure Computer and Network Systems
Nong Ye€128.99Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated...
View full details€128.99Sold out -
Sold out
Group Theoretic Cryptography
Maria Isabel Gonzalez Vasco€117.99Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the l...
View full details€117.99Sold out -
Sold out
Wireless Security Handbook
Aaron E. Earle€173.60The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, incl...
View full details€173.60Sold out -
Sold out
Database Hacker's Handbook
Bill Grindlay€40.99Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment ...
View full details€40.99Sold out -
Sold out
Introduction to Cryptography
Rajeev A. Sahu€56.99Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks. Achieving cyber security...
View full details€56.99Sold out -
Sold out
Cryptography
Douglas Robert Stinson€54.99Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer fo...
View full details€54.99Sold out -
Sold out
Critical Incident Management
Alan B. Sterneckert€132.99Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in ma...
View full details€132.99Sold out -
Sold out
Coding Theory and Cryptography
C.A. Rodger€117.99Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, proven by the authors in a popular two-qua...
View full details€117.99Sold out -
Sold out
Computer System and Network Security
Eric A. Fisch€179.80Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and ...
View full details€179.80Sold out -
Sold out
Introduction to Cryptography
Rajeev A. Sahu€192.20Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks. Achieving cyber security...
View full details€192.20Sold out -
Sold out
Integer Algorithms In Cryptology And Information Assurance
Boris S Verkhovsky€179.80Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocols fo...
View full details€179.80Sold out -
Sold out
Noiseless Steganography
Abdelrahman Desoky€132.99Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover...
View full details€132.99Sold out -
Sold out
Security for Ubiquitous Computing
Frank Stajano€110.99* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks * Focuses on tw...
View full details€110.99Sold out -
Sale
Symmetric Cryptography, Volume 1
ISTE Ltd€163.68Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the eff...
View full details€163.68Sale -
Sold out
Art of Deception
Kevin D. Mitnick€44.99The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-despera...
View full details€44.99Sold out -
Sold out
Building Internet Firewalls
Elizabeth D. Zwicky€59.99In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong...
View full details€59.99Sold out -
Sold out
Essential PHP Security
Chris Shiflett€29.99Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web developm...
View full details€29.99Sold out -
Sold out
Authentication Codes and Combinatorial Designs
Dingyi Pei€132.99Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to informati...
View full details€132.99Sold out