Data Encryption
-
Save 0%
Investigating Cryptocurrencies
Nick FurneauxCurrent price €59.75Original price €59.99Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a ...
View full detailsCurrent price €59.75Original price €59.99Save 0% -
Sold out
Enterprise Security Architecture
Nicholas Sherwood€112.99Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise. Enterprise Security Ar...
View full details€112.99Sold out -
Sold out
Information Warfare
Matthew Warren€67.99This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to d...
View full details€67.99Sold out -
Sold out
Essential Cryptography for JavaScript Developers
Alessandro Segala€34.99Discover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help of examples in Java...
View full details€34.99Sold out -
Sold out
Cryptography In The Information Society
Andrey Fionov€92.99This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the c...
View full details€92.99Sold out -
Sold out
IT Security Interviews Exposed
Brian Kirouac€25.99Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help Divided in...
View full details€25.99Sold out -
Sold out
Mapping Hacks
Schuyler Erle€29.99Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountai...
View full details€29.99Sold out -
Sold out
Computer Forensics
Michael Sheetz€82.99Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A brea...
View full details€82.99Sold out -
Sold out
Professional Pen Testing for Web Applications
Andres Andreu€52.99There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing c...
View full details€52.99Sold out -
Sold out
Coding Theory And Cryptology
Harald Niederreiter€99.99The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December ...
View full details€99.99Sold out -
Sold out
Business of Cybersecurity
Ashwini Sathnur€28.50Cybersecurity could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th centu...
View full details€28.50Sold out -
Sold out
Bulletproof TLS and PKI, Second Edition
Ivan Ristic€61.50Bulletproof TLS and PKI is a complete guide to using TLS encryption and PKI to deploy secure servers and web applications. Written by Ivan Ristic, ...
View full details€61.50Sold out -
Sold out
Information Security Management Metrics
W. Krag Brotby€92.99Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. Th...
View full details€92.99Sold out -
Sold out
Multimedia Content Encryption
Shiguo Lian€127.99The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no l...
View full details€127.99Sold out -
Sold out
Blockchain Technology and Applications
Ahmed Banafa€99.99Blockchain is an emerging technology that can radically improve security in transaction networks, it provides the basis for a dynamic distributed l...
View full details€99.99Sold out -
Sold out
Cryptography
Oxford University Press€10.50This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. I...
View full details€10.50Sold out -
Sold out
Art of Deception
Kevin D. Mitnick€16.26The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-despera...
View full details€16.26Sold out -
Sold out
Practical Hacking Techniques and Countermeasures
Mark D. Spivey€107.99Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate...
View full details€107.99Sold out -
Sold out
Cyber Forensics
Albert Marcella€132.99Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Comput...
View full details€132.99Sold out -
Sold out
RSA and Public-Key Cryptography
Richard A. Mollin€74.99Although much literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent de...
View full details€74.99Sold out -
Sold out
RC4 Stream Cipher and Its Variants
Goutam Paul€74.99RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream ciph...
View full details€74.99Sold out -
Sold out
Improving your C# Skills
Clayton Hunt€49.99Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel progr...
View full details€49.99Sold out -
Sold out
Enterprise Level Security 2
Institute for Defense Analyses€49.99Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), whic...
View full details€49.99Sold out -
Sold out
Security and Usability
Lorrie Faith Cranor€49.99Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts h...
View full details€49.99Sold out