Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Narrow Your Search

By Availability


By Format


By Price


By Publication Date


Data encryption

552 results

Public-Key Cryptography -- PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings

978/366/246/9783662464465.jpg

Public-Key Cryptography -- PKC 2015: 18th IACR International Conference...

Jonathan Katz

Data encryption

Paperback

This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography,... [more]

$296.45  $266.80

We can order this in for you
How long will it take?
Add this item to my basket
Theory of Cryptography: 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II

978/366/246/9783662464960.jpg

Theory of Cryptography: 12th International Conference, TCC 2015, Warsaw,...

Yevgeniy Dodis, Jesper Buus Nielsen

Algorithms & data structures; Data capture & analysis; Data encryption; User interface design & usability

Paperback

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory... [more]

$271.60  $244.45

We can order this in for you
How long will it take?
Add this item to my basket
Theory of Cryptography: 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I

978/366/246/9783662464939.jpg

Theory of Cryptography: 12th International Conference, TCC 2015, Warsaw,...

Yevgeniy Dodis, Jesper Buus Nielsen

Algorithms & data structures; Data capture & analysis; Data encryption; User interface design & usability

Paperback

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory... [more]

$246.70  $222.05

We can order this in for you
How long will it take?
Add this item to my basket
Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers

978/331/915/9783319150864.jpg

Information Security Applications: 15th International Workshop, WISA 2014,...

Kyung-Hyune Rhee, Jeong Hyun Yi, Kyung-Hyune Rhee

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

no-image-available.jpg

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New...

Will Arthur, David Challener

Software Engineering; Data encryption

Paperback

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for... [more]

$104.95  $94.45

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Warfare: Building the Scientific Foundation

978/331/914/9783319140384.jpg

Cyber Warfare: Building the Scientific Foundation

Sushil Jajodia, Dr. Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang

Information retrieval; Computer security; Data encryption

Hardback

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and... [more]

$267.45  $240.70

We can order this in for you
How long will it take?
Add this item to my basket
Applied Cryptography: Protocols, Algorithms and Source Code in C

978/111/909/9781119096726.jpg

Applied Cryptography: Protocols, Algorithms and Source Code in C

Bruce Schneier

Data encryption

Hardback

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive... [more]

$109.95

We can order this in for you
How long will it take?
Add this item to my basket
Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers

978/331/913/9783319130651.jpg

Radio Frequency Identification: Security and Privacy Issues: 10th International...

Nitesh Saxena, Ahmad-Reza Sadeghi

Radio technology; Data encryption; Pattern recognition

Paperback

This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held... [more]

$144.95  $130.45

We can order this in for you
How long will it take?
Add this item to my basket
The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web

no-image-available.jpg

The Manager's Guide to Web Application Security: A Concise Guide to the...

Ron Lepofsky

Data encryption

Paperback

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every... [more]

$167.60  $150.85

We can order this in for you
How long will it take?
Add this item to my basket
Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers

978/366/245/9783662454718.jpg

Financial Cryptography and Data Security: 18th International Conference,...

Nicolas Christin, Reihaneh Safavi-Naini

Coding theory & cryptology; Business applications; Data encryption

Paperback

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial... [more]

$238.95  $215.05

We can order this in for you
How long will it take?
Add this item to my basket
Applications and Techniques in Information Security: International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings

978/366/245/9783662456699.jpg

Applications and Techniques in Information Security: International Conference,...

Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren

Data encryption

Paperback

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information... [more]

$169.95  $152.95

We can order this in for you
How long will it take?
Add this item to my basket
Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers

978/331/912/9783319123998.jpg

Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March...

Petr Svenda, Bruce Christianson, Vaclav Vashek Matyas, James Malcolm, Frank Stajano

Network hardware; Data encryption; Information architecture

Paperback

This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols,... [more]

$188.90  $170.00

We can order this in for you
How long will it take?
Add this item to my basket
Progress in Cryptology -- INDOCRYPT 2014: 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings

978/331/913/9783319130385.jpg

Progress in Cryptology -- INDOCRYPT 2014: 15th International Conference...

Willi Meier, Debdeep Mukhopadhyay

Data encryption

Paperback

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014,... [more]

$200.15  $180.15

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II

978/366/245/9783662456071.jpg

Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference...

Palash Sarkar, Tetsu Iwata

Coding theory & cryptology; Data encryption; Computer science

Paperback

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory... [more]

$221.85  $199.65

We can order this in for you
How long will it take?
Add this item to my basket
Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I

978/366/245/9783662456101.jpg

Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference...

Palash Sarkar, Tetsu Iwata

Coding theory & cryptology; Data encryption; Computer science

Paperback

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory... [more]

$221.85  $199.65

We can order this in for you
How long will it take?
Add this item to my basket
Principles of Computer Security Lab Manual, Fourth Edition

978/007/183/9780071836555.jpg

Principles of Computer Security Lab Manual, Fourth Edition

Vincent J. Nestler, Keith Harrison, Matthew P. Hirsch, Wm. Arthur Conklin, Corey Schou

Coding theory & cryptology; Network hardware; Computer viruses, Trojans & worms; Data encryption

Paperback

Written by leading IT security educators and featuring 40+ challenging labs, this fully updated lab manual supplements Principles... [more]

$139.95  $125.95

We can order this in for you
How long will it take?
Add this item to my basket
Foundations of Coding: Compression, Encryption, Error Correction

978/111/888/9781118881446.jpg

Foundations of Coding: Compression, Encryption, Error Correction

Jean-Guillaume Dumas, Jean-Louis Roch, Eric Tannier, Sebastien Varrette

Data encryption

Hardback

Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding... [more]

$172.95

We can order this in for you
How long will it take?
Add this item to my basket
Construction and Analysis of Cryptographic Functions

978/331/912/9783319129907.jpg

Construction and Analysis of Cryptographic Functions

Lilya Budaghyan

Coding theory & cryptology; Differential calculus & equations; Combinatorics & graph theory; Data encryption

Hardback

This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear... [more]

$188.90  $170.00

We can order this in for you
How long will it take?
Add this item to my basket
Cryptography and Network Security: Principles and Practice, Global Edition

no-image-available.jpg

Cryptography and Network Security: Principles and Practice, Global Edition...

William Stallings

Data encryption; Network security

Mixed media product

Intended for one-semester, undergraduate and graduate level courses in Cryptography, Computer Security, and Network Security.... [more]

$117.95

We can order this in for you
How long will it take?
Add this item to my basket
Information Hiding in Speech Signals for Secure Communication

978/012/801/9780128013281.jpg

Information Hiding in Speech Signals for Secure Communication

Zhijun Wu (Civil Aviation University of China, Tianjin, China)

Data encryption

Paperback

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods... [more]

$82.95

We can order this in for you
How long will it take?
Add this item to my basket
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

978/190/711/9781907117046.jpg

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to...

Ivan Ristic

Data encryption

Paperback

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications.... [more]

$183.95  $165.55

We can order this in for you
How long will it take?
Add this item to my basket
Introduction to Modern Cryptography

978/146/657/9781466570269.jpg

Introduction to Modern Cryptography

Jonathan Katz, Yehuda Lindell

Privacy & data protection; Data encryption

Hardback

Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems... [more]

$126.00

We can order this in for you
How long will it take?
Add this item to my basket
Cyber Crime and Cyber Terrorism Investigator's Handbook

978/012/800/9780128007433.jpg

Cyber Crime and Cyber Terrorism Investigator's Handbook

Professor Babak Akhgar, Andrew Staniforth, Francesca Cortesi Bosco

Privacy & data protection; Computer fraud & hacking; Computer viruses, Trojans & worms; Data encryption

Paperback

Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students,... [more]

$58.95

We can order this in for you
How long will it take?
Add this item to my basket
Integer Algorithms In Cryptology And Information Assurance

978/981/462/9789814623742.jpg

Integer Algorithms In Cryptology And Information Assurance

Boris S Verkhovsky (New Jersey Inst Of Technology, Usa)

Data encryption

Hardback

Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms... [more]

$294.40  $264.95

We can order this in for you
How long will it take?
Add this item to my basket
Querying over Encrypted Data in Smart Grids

978/331/906/9783319063546.jpg

Querying over Encrypted Data in Smart Grids

Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen

Communications engineering & telecommunications; Data encryption; Grid computing

Paperback

This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid... [more]

$121.05  $108.95

We can order this in for you
How long will it take?
Add this item to my basket
My Shopping Basket
Your cart does not contain any items.