Tomeki

Explore Books on
data security data encryption

1-24 of 121 Books

View CISSP for dummies By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory
Cover of CISSP for dummies by lawrence h. miller,peter h. gregory,lawrence miller,lawrence c. miller,peter h., cisa, cissp gregory,peter gregory

CISSP for dummies

By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory

View Introduction to modern cryptography By Jonathan Katz,Yehuda Lindell
Cover of Introduction to modern cryptography by jonathan katz,yehuda lindell

Introduction to modern cryptography

By Jonathan Katz,Yehuda Lindell

View Privacy on the line By Whitfield Diffie,Susan Landau,Whitfield Diffie,Susan Landau
Cover of Privacy on the line by whitfield diffie,susan landau,whitfield diffie,susan landau

Privacy on the line

By Whitfield Diffie,Susan Landau,Whitfield Diffie,Susan Landau

View Computer Security Basics By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen
Cover of Computer Security Basics by deborah russell,sr. g.t gangemi,rick lehtinen

Computer Security Basics

By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen

View Coding theory and cryptography By Darrel R. Hankerson,D.C. Hankerson,Gary Hoffman,D.A. Leonard,Charles C. Lindner,K.T. Phelps,C.A. Rodger,J.R. Wall
Cover of Coding theory and cryptography by darrel r. hankerson,d.c. hankerson,gary hoffman,d.a. leonard,charles c. lindner,k.t. phelps,c.a. rodger,j.r. wall

Coding theory and cryptography

By Darrel R. Hankerson,D.C. Hankerson,Gary Hoffman,D.A. Leonard,Charles C. Lindner,K.T. Phelps,C.A. Rodger,J.R. Wall

View Intelligence and Security Informatics By Hsinchun Chen
Cover of Intelligence and Security Informatics by hsinchun chen

Intelligence and Security Informatics

By Hsinchun Chen

View Data-driven block ciphers for fast telecommunication systems By Nick Moldovyan,Nikolai Moldovyan,Alexander A. Moldovyan
Cover of Data-driven block ciphers for fast telecommunication systems by nick moldovyan,nikolai moldovyan,alexander a. moldovyan

Data-driven block ciphers for fast telecommunication systems

By Nick Moldovyan,Nikolai Moldovyan,Alexander A. Moldovyan

View Trust and security in collaborative computing By Xukai Zou,Xukai Zou,Yuan-shun Dai
Cover of Trust and security in collaborative computing by xukai zou,xukai zou,yuan-shun dai

Trust and security in collaborative computing

By Xukai Zou,Xukai Zou,Yuan-shun Dai

View Computational algorithms for fingerprint recognition By Bir Bhanu,Xuejun Tan
Cover of Computational algorithms for fingerprint recognition by bir bhanu,xuejun tan

Computational algorithms for fingerprint recognition

By Bir Bhanu,Xuejun Tan

View Data & computer security By Dennis Longley,Michael Shain
Cover of Data & computer security by dennis longley,michael shain

Data & computer security

By Dennis Longley,Michael Shain

View Applied cryptanalysis By Mark Stamp,Richard M. Low
Cover of Applied cryptanalysis by mark stamp,richard m. low

Applied cryptanalysis

By Mark Stamp,Richard M. Low

View Long-term preservation of digital documents By Uwe M. Borghoff,Peter Rödig,Jan Scheffczyk,Lothar Schmitz
Cover of Long-term preservation of digital documents by uwe m. borghoff,peter rödig,jan scheffczyk,lothar schmitz

Long-term preservation of digital documents

By Uwe M. Borghoff,Peter Rödig,Jan Scheffczyk,Lothar Schmitz

View Mastering network security By Chris Brenton,Cameron Hunt
Cover of Mastering network security by chris brenton,cameron hunt

Mastering network security

By Chris Brenton,Cameron Hunt

View Guide to computer forensics and investigations By Bill Nelson,Amelia Phillips,Frank Enfinger,Christopher Steuart
Cover of Guide to computer forensics and investigations by bill nelson,amelia phillips,frank enfinger,christopher steuart

Guide to computer forensics and investigations

By Bill Nelson,Amelia Phillips,Frank Enfinger,Christopher Steuart

View Cisco Asa By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim
Cover of Cisco Asa by frahim, jazib/ santos, omar,omar santos,jazib frahim

Cisco Asa

By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim

View Maximum wireless security By Cyrus Peikari,Seth Fogie
Cover of Maximum wireless security by cyrus peikari,seth fogie

Maximum wireless security

By Cyrus Peikari,Seth Fogie

View Understanding PKI By Carlisle Adams,Carlisle Adams,Steve Lloyd
Cover of Understanding PKI by carlisle adams,carlisle adams,steve lloyd

Understanding PKI

By Carlisle Adams,Carlisle Adams,Steve Lloyd

View Virtual Private Networks By Charlie Scott,Mike Erwin,Paul Wolfe
Cover of Virtual Private Networks by charlie scott,mike erwin,paul wolfe

Virtual Private Networks

By Charlie Scott,Mike Erwin,Paul Wolfe

View The art of software security assessment By Mark Dowd,John McDonald,Justin Schuh
Cover of The art of software security assessment by mark dowd,john mcdonald,justin schuh

The art of software security assessment

By Mark Dowd,John McDonald,Justin Schuh

View Combating spyware in the enterprise By Brian Baskin,Tony Piltzecker,Paul Piccard,Jeremy Faircloth
Cover of Combating spyware in the enterprise by brian baskin,tony piltzecker,paul piccard,jeremy faircloth

Combating spyware in the enterprise

By Brian Baskin,Tony Piltzecker,Paul Piccard,Jeremy Faircloth

View Disseminating security updates at Internet scale By Jun Li,Jun Li,Peter Reiher,Gerald J. Popek
Cover of Disseminating security updates at Internet scale by jun li,jun li,peter reiher,gerald j. popek

Disseminating security updates at Internet scale

By Jun Li,Jun Li,Peter Reiher,Gerald J. Popek

View TICSA TruSecure ICSA certified security associate By Mike Chapple,Debra Littlejohn Shinder,Shawn Porter
Cover of TICSA TruSecure ICSA certified security associate by mike chapple,debra littlejohn shinder,shawn porter

TICSA TruSecure ICSA certified security associate

By Mike Chapple,Debra Littlejohn Shinder,Shawn Porter

View Incident response By E. Eugene Schultz,Russell Shumway
Cover of Incident response by e. eugene schultz,russell shumway

Incident response

By E. Eugene Schultz,Russell Shumway

View Internet site security By Erik S. Schetina,Erik Schetina,Ken Green,Jacob Carlson
Cover of Internet site security by erik s. schetina,erik schetina,ken green,jacob carlson

Internet site security

By Erik S. Schetina,Erik Schetina,Ken Green,Jacob Carlson