Tomeki

Explore Books on
data encryption (computer science)

1-24 of 1,675 Books

View Cryptonomicon By Neal Stephenson
Cover of Cryptonomicon by neal stephenson

Cryptonomicon

By Neal Stephenson

View The Code Book By Simon Singh
Cover of The Code Book by simon singh

The Code Book

By Simon Singh

View Ruthless.com By Jerome Preisler
Cover of Ruthless.com by jerome preisler

Ruthless.com

By Jerome Preisler

View The Hacker Crackdown By Bruce Sterling
Cover of The Hacker Crackdown by bruce sterling

The Hacker Crackdown

By Bruce Sterling

View Foundations and Practice of Security By Joaquin Garcia-Alfaro
Cover of Foundations and Practice of Security by joaquin garcia-alfaro

Foundations and Practice of Security

By Joaquin Garcia-Alfaro

View Ethical and social issues in the information age By Joseph Migga Kizza
Cover of Ethical and social issues in the information age by joseph migga kizza

Ethical and social issues in the information age

By Joseph Migga Kizza

View Financial Cryptography and Data Security By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff
Cover of Financial Cryptography and Data Security by jeremy clark,sarah meiklejohn,peter y. a. ryan,dan wallach,michael brenner,kurt rohloff

Financial Cryptography and Data Security

By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff

View Security without Obscurity By Jeff Stapleton
Cover of Security without Obscurity by jeff stapleton

Security without Obscurity

By Jeff Stapleton

View Network Security Assessment By Chris McNab
Cover of Network Security Assessment by chris mcnab

Network Security Assessment

By Chris McNab

View Cloud Computing and Security By Xingming Sun,Alex Liu,Han-Chieh Chao,Elisa Bertino
Cover of Cloud Computing and Security by xingming sun,alex liu,han-chieh chao,elisa bertino

Cloud Computing and Security

By Xingming Sun,Alex Liu,Han-Chieh Chao,Elisa Bertino

View Information Security and Cryptology By Dongdai Lin,Shouhuai Xu,Moti Yung
Cover of Information Security and Cryptology by dongdai lin,shouhuai xu,moti yung

Information Security and Cryptology

By Dongdai Lin,Shouhuai Xu,Moti Yung

View Digital watermarking and steganography By Frank Y. Shih

Digital watermarking and steganography

Digital watermarking and steganography

By Frank Y. Shih

View Information security and cryptology By Helger Lipmaa,Moti Yung,Donghai Lin
Cover of Information security and cryptology by helger lipmaa,moti yung,donghai lin

Information security and cryptology

By Helger Lipmaa,Moti Yung,Donghai Lin

View Digital Forensics and Watermarking By Yun Qing Shi,Hyoung Joong Kim,Fernando Perez-Gonzalez,Feng Liu
Cover of Digital Forensics and Watermarking by yun qing shi,hyoung joong kim,fernando perez-gonzalez,feng liu

Digital Forensics and Watermarking

By Yun Qing Shi,Hyoung Joong Kim,Fernando Perez-Gonzalez,Feng Liu

View Crypto By Steven Levy
Cover of Crypto by steven levy

Crypto

By Steven Levy

View Secure data management By Willem Jonker,Milan Petkovic
Cover of Secure data management by willem jonker,milan petkovic

Secure data management

By Willem Jonker,Milan Petkovic

View Future Data and Security Engineering By Tran Khanh Dang,Roland Wagner,Erich J. Neuhold,Makoto Takizawa,Josef Küng,Nam Thoai
Cover of Future Data and Security Engineering by tran khanh dang,roland wagner,erich j. neuhold,makoto takizawa,josef küng,nam thoai

Future Data and Security Engineering

By Tran Khanh Dang,Roland Wagner,Erich J. Neuhold,Makoto Takizawa,Josef Küng,Nam Thoai

View Privacy on the line By Whitfield Diffie,Susan Landau,Whitfield Diffie,Susan Landau
Cover of Privacy on the line by whitfield diffie,susan landau,whitfield diffie,susan landau

Privacy on the line

By Whitfield Diffie,Susan Landau,Whitfield Diffie,Susan Landau

View Law of electronic commercial transactions By Faye Fangfei Wang
Cover of Law of electronic commercial transactions by faye fangfei wang

Law of electronic commercial transactions

By Faye Fangfei Wang

View Electronic Voting By Robert Krimmer,Melanie Volkamer,Nadja Braun Binder,Norbert Kersting,Olivier Pereira,Carsten Schürmann
Cover of Electronic Voting by robert krimmer,melanie volkamer,nadja braun binder,norbert kersting,olivier pereira,carsten schürmann

Electronic Voting

By Robert Krimmer,Melanie Volkamer,Nadja Braun Binder,Norbert Kersting,Olivier Pereira,Carsten Schürmann

View Multiple Access Communications By Boris Bellalta
Cover of Multiple Access Communications by boris bellalta

Multiple Access Communications

By Boris Bellalta

View Cryptology By Richard E. Klima
Cover of Cryptology by richard e. klima

Cryptology

By Richard E. Klima

View Applied cryptography and network security By Jianying Zhou,Moti Yung,Yongfei Han
Cover of Applied cryptography and network security by jianying zhou,moti yung,yongfei han

Applied cryptography and network security

By Jianying Zhou,Moti Yung,Yongfei Han

View Software and Data Technologies By José Cordeiro
Cover of Software and Data Technologies by josé cordeiro

Software and Data Technologies

By José Cordeiro