Explore: Data Encryption
Discover books, insights, and more — all in one place.
Learn more about Data Encryption with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “data-encryption”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Ethical and social issues in the information age
By Joseph Migga Kizza

“Ethical and social issues in the information age” Metadata:
- Title: ➤ Ethical and social issues in the information age
- Author: Joseph Migga Kizza
- Language: English
- Number of Pages: Median: 372
- Publisher: ➤ Springer-Verlag - Springer - Brand: Springer - Springer International Publishing AG - Springer Science & Business Media - Springer London, Limited
- Publish Date: ➤ 1998 - 2003 - 2007 - 2010 - 2012 - 2013 - 2015 - 2017 - 2018 - 2023 - 2024
- Publish Location: New York - London
“Ethical and social issues in the information age” Subjects and Themes:
- Subjects: ➤ Computers - Computers and civilization - Information technology - Moral and ethical aspects - Moral and ethical aspects of Computers - Moral and ethical aspects of Information technology - Social aspects - Social aspects of Information technology - Soziologie - Ethik - Informationstechnik - Science - Philosophy - Electronic books - Computer science - Business Ethics - BUSINESS & ECONOMICS - Informatique - Technology, social aspects - Information society - Computers & the internet - Information Systems Applications (incl. Internet) - Data encryption (Computer science) - Technology - Social sciences - Computers and Society - Data Encryption - User Interfaces and Human Computer Interaction - Social Sciences, general - Philosophy of Technology
Edition Identifiers:
- The Open Library ID: ➤ OL51581283M - OL50503948M - OL46542360M - OL46060044M - OL37155976M - OL37109147M - OL37107167M - OL30513289M - OL30150810M - OL28307589M - OL28277063M - OL28173850M - OL28040366M - OL22117640M - OL22761252M - OL676725M
- Online Computer Library Center (OCLC) ID: 37037372 - 495598364
- Library of Congress Control Number (LCCN): 2010920467 - 2001060202 - 97022993 - 2007922975
- All ISBNs: ➤ 9781849960373 - 9781447149910 - 9783031248627 - 184628659X - 9781846286582 - 3319707116 - 1447149904 - 3031248627 - 1849960399 - 9781447149897 - 1846286581 - 038795421X - 0387982752 - 1447149890 - 1447125452 - 1447159721 - 9783031257209 - 9781447125457 - 9781849960380 - 3031257200 - 9781846286599 - 1849960372 - 9780387954219 - 1849960380 - 9781447149903 - 9780387982755 - 9783319889825 - 1447149912 - 3319889826 - 9781447159728 - 9781849960397 - 9783319707112
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Ethical and social issues in the information age at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Financial Cryptography and Data Security
By Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan Wallach, Michael Brenner and Kurt Rohloff

“Financial Cryptography and Data Security” Metadata:
- Title: ➤ Financial Cryptography and Data Security
- Authors: ➤ Jeremy ClarkSarah MeiklejohnPeter Y. A. RyanDan WallachMichael BrennerKurt Rohloff
- Language: English
- Number of Pages: Median: 323
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: ➤ 2013 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020 - 2025
“Financial Cryptography and Data Security” Subjects and Themes:
- Subjects: ➤ Electronic funds transfers - Data encryption (computer science) - Electronic commerce - Computer security - Internet, security measures - Cryptography, data processing - System design - Computer networks, security measures - Internal security - Computer science - Data protection - Information systems - Systems and Data Security - Data Encryption - E-Commerce/e-business - Computer Appl. in Administrative Data Processing
Edition Identifiers:
- The Open Library ID: ➤ OL57532211M - OL28239582M - OL30907132M - OL29728105M - OL34528868M - OL28253524M - OL28249616M - OL28281516M - OL57550244M - OL30358706M - OL30527919M - OL28740778M - OL37229466M - OL28041391M
- All ISBNs: ➤ 3662447738 - 3662583860 - 9783662480502 - 9783662588192 - 3031786750 - 3662480506 - 9783662583869 - 9783642413216 - 364241320X - 9783031786754 - 9783319702773 - 9783662447734 - 3031786785 - 9783662533567 - 3030437248 - 9783030437244 - 9783031786785 - 3662588196 - 3642413196 - 9783319428260 - 3319428268 - 9783642413209 - 3662480514 - 9783642413193 - 3319702777 - 9783662480519 - 3662533561 - 3642413218
Author's Alternative Names:
"Peter Y A Ryan" and "Peter Y.A. Ryan"Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Financial Cryptography and Data Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Information Security and Cryptology
By Dongdai Lin, Shouhuai Xu and Moti Yung

“Information Security and Cryptology” Metadata:
- Title: ➤ Information Security and Cryptology
- Authors: Dongdai LinShouhuai XuMoti Yung
- Language: English
- Number of Pages: Median: 549
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: ➤ 2005 - 2012 - 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020
“Information Security and Cryptology” Subjects and Themes:
- Subjects: ➤ Data encryption (computer science) - Cryptography - Computer security - Computer crimes - Computer science - Data protection - Coding theory - Computer software - Systems and Data Security - Data Encryption - Coding and Information Theory - Algorithm Analysis and Problem Complexity
Edition Identifiers:
- The Open Library ID: ➤ OL27982780M - OL34520758M - OL34520412M - OL30681928M - OL28743416M - OL35758151M - OL27967485M - OL27956435M - OL28191991M - OL28200171M - OL27995485M - OL37262695M
- All ISBNs: ➤ 9783319388977 - 3030429202 - 9783030142339 - 9783319547046 - 3030142337 - 9783540324249 - 9783030429201 - 9783319120867 - 331975159X - 3319388983 - 3540324240 - 3319167448 - 3642347037 - 3319120875 - 9783642347030 - 9783319167442 - 3319120867 - 3319167456 - 9783319751597 - 3319388975 - 9783319388984 - 3319547046 - 9783319167459 - 9783319120874
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and Cryptology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Digital Forensics and Watermarking
By Yun Qing Shi, Hyoung Joong Kim, Fernando Perez-Gonzalez and Feng Liu

“Digital Forensics and Watermarking” Metadata:
- Title: ➤ Digital Forensics and Watermarking
- Authors: Yun Qing ShiHyoung Joong KimFernando Perez-GonzalezFeng Liu
- Language: English
- Number of Pages: Median: 464
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: ➤ 2012 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020
“Digital Forensics and Watermarking” Subjects and Themes:
- Subjects: ➤ Forensic sciences - Computer security - Data protection - Watermarks - Data encryption (computer science) - Data structures (computer science) - Information storage and retrieval systems - Computer graphics - Computer vision - Artificial intelligence - Computer networks - Computer science - Data encryption (Computer science) - Coding theory - Data Encryption - Systems and Data Security - Computer Imaging, Vision, Pattern Recognition and Graphics - Computers and Society - Coding and Information Theory
Edition Identifiers:
- The Open Library ID: ➤ OL28338997M - OL34372353M - OL28363753M - OL36218736M - OL34536829M - OL36215055M - OL28311430M - OL28038987M - OL28292342M - OL28246398M - OL28143742M
- All ISBNs: ➤ 331919321X - 3319193201 - 3319319590 - 9783319319605 - 3662438860 - 9783319193205 - 3319319604 - 9783319193212 - 9783319319599 - 9783319534640 - 9783662438855 - 3662438852 - 3030113884 - 9783662438862 - 3319534645 - 3030435741 - 9783642322044 - 9783319641843 - 3642322042 - 9783030113889 - 9783030435745 - 3319641840
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Digital Forensics and Watermarking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Secure data management
By Willem Jonker and Milan Petkovic

“Secure data management” Metadata:
- Title: Secure data management
- Authors: Willem JonkerMilan Petkovic
- Language: English
- Number of Pages: Median: 177
- Publisher: ➤ Springer - Springer London, Limited - Springer International Publishing AG
- Publish Date: ➤ 2004 - 2005 - 2006 - 2007 - 2009 - 2010 - 2012 - 2014
“Secure data management” Subjects and Themes:
- Subjects: ➤ Database security - Computers - Congresses - Access control - Database management - Computer security - Information Systems Applications (incl. Internet) - Computer science - Data encryption (Computer science) - Data protection - Systems and Data Security - Computers and Society - Data Encryption
Edition Identifiers:
- The Open Library ID: ➤ OL37229200M - OL37140922M - OL37140685M - OL37122168M - OL37121881M - OL37121706M - OL37111598M - OL34501369M - OL34374863M - OL9056855M
- Online Computer Library Center (OCLC) ID: 71298972
- Library of Congress Control Number (LCCN): 2006931629
- All ISBNs: ➤ 3540389873 - 9783540300731 - 9783540319740 - 9783319068114 - 9783540389842 - 3540319743 - 3540389849 - 9783319068107 - 3642328725 - 354075248X - 3319068105 - 3642155464 - 3319068113 - 9783540752486 - 9783642328725 - 9783642042195 - 9783540389873 - 3642042198 - 9783642155468 - 3540300732
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Secure data management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Future Data and Security Engineering
By Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng and Nam Thoai

“Future Data and Security Engineering” Metadata:
- Title: ➤ Future Data and Security Engineering
- Authors: ➤ Tran Khanh DangRoland WagnerErich J. NeuholdMakoto TakizawaJosef KüngNam Thoai
- Language: English
- Number of Pages: Median: 336
- Publisher: ➤ Springer - Springer London, Limited - Springer International Publishing AG
- Publish Date: ➤ 2014 - 2015 - 2016 - 2017 - 2018 - 2019 - 2020 - 2021
“Future Data and Security Engineering” Subjects and Themes:
- Subjects: ➤ Computer security - Data encryption (computer science) - Data mining - Internet - Database management - Information retrieval - Information organization - Computer science - Data protection - Computer software - Information storage and retrieval systems - Information Systems - Management of Computing and Information Systems - Systems and Data Security - Data Encryption - Algorithm Analysis and Problem Complexity
Edition Identifiers:
- The Open Library ID: ➤ OL37318168M - OL35874579M - OL28026084M - OL27954335M - OL34526419M - OL34520760M - OL28054911M - OL28213947M - OL28349314M - OL34718279M
- All ISBNs: ➤ 9783319127774 - 9783030913861 - 9783319700038 - 9783319261355 - 9783319261348 - 9783319480565 - 3319480561 - 3030031918 - 3319261347 - 9783319127781 - 3319261355 - 3030356523 - 3319127780 - 3030639231 - 3319127772 - 9783030639235 - 9783030031916 - 3030913864 - 3319700030 - 9783030356521
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Future Data and Security Engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Multiple Access Communications
By Boris Bellalta

“Multiple Access Communications” Metadata:
- Title: Multiple Access Communications
- Author: Boris Bellalta
- Language: English
- Number of Pages: Median: 159
- Publisher: ➤ Springer Berlin / Heidelberg - Springer London, Limited - Springer Berlin Heidelberg - Springer - Springer International Publishing AG - Imprint: Springer
- Publish Date: ➤ 2010 - 2012 - 2013 - 2014 - 2015
- Publish Location: Berlin, Heidelberg
“Multiple Access Communications” Subjects and Themes:
- Subjects: ➤ Information Systems - Software engineering - Computer networks - Algorithm Analysis and Problem Complexity - Information Systems Applications (incl. Internet) - Data encryption (Computer science) - Management of Computing and Information Systems - Data Encryption - Computer software - Computer science - Digital communications - Congresses - Multiple access protocols (Computer network protocols) - Computer network protocols - Communication - Computer Communication Networks - Computers and Society
Edition Identifiers:
- The Open Library ID: ➤ OL35792944M - OL35761686M - OL34529955M - OL34523794M - OL34520500M - OL34505741M - OL34481249M - OL27955788M - OL27076265M
- Library of Congress Control Number (LCCN): 2012951532
- All ISBNs: ➤ 3319038702 - 364215428X - 3319234404 - 3319234390 - 9783319038711 - 9783319102627 - 3319038710 - 9783319234403 - 3642349765 - 3319102621 - 9783319038704 - 9783319234397 - 3319102613 - 9783642349768 - 9783642349751 - 9783642154287 - 9783319102610 - 3642349757
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Multiple Access Communications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Advances in Information Technology
By Borworn Papasratorn, Nipon Charoenkitkarn, Kittichai Lavangnananda, Wichian Chutimaskul and Vajirasak Vanijja

“Advances in Information Technology” Metadata:
- Title: ➤ Advances in Information Technology
- Authors: Borworn PapasratornNipon CharoenkitkarnKittichai LavangnanandaWichian ChutimaskulVajirasak Vanijja
- Language: English
- Number of Pages: Median: 216
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2009 - 2010 - 2012 - 2013
“Advances in Information Technology” Subjects and Themes:
- Subjects: ➤ Information technology - Artificial Intelligence (incl. Robotics) - Information Systems Applications (incl. Internet) - Software engineering - Computer science - Data encryption (Computer science) - Computer network architectures - Artificial intelligence - User Interfaces and Human Computer Interaction - Data Encryption - Computer Systems Organization and Communication Networks - Information retrieval - Information organization - Computer Communication Networks - Information storage and retrieval systems
Edition Identifiers:
- The Open Library ID: ➤ OL28306005M - OL27986504M - OL37124385M - OL37235246M - OL37140356M - OL28124981M - OL37235495M - OL31488447M
- All ISBNs: ➤ 3319037838 - 3642350771 - 3642350763 - 9783642350771 - 3642103928 - 9783642103926 - 9783319037837 - 9783642166990 - 3642350755 - 9783319037820 - 3642166997 - 331903782X - 9783642103933 - 9783642350757 - 3642103936 - 9783642350764
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Information Technology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Applications and Techniques in Information Security
By Lynn Batten and Gang Li

“Applications and Techniques in Information Security” Metadata:
- Title: ➤ Applications and Techniques in Information Security
- Authors: Lynn BattenGang Li
- Language: English
- Number of Pages: Median: 237
- Publisher: ➤ Ingramcontent - Springer - Batten Lynn - Springer London, Limited
- Publish Date: ➤ 2014 - 2015 - 2016 - 2017 - 2018 - 2019
“Applications and Techniques in Information Security” Subjects and Themes:
- Subjects: ➤ Internet - Congresses - Security measures - Computer networks - Information storage and retrieval systems - Computer security - Information networks - Computer networks, security measures - Computer science - Data encryption (Computer science) - Data protection - Systems and Data Security - Data Encryption
Edition Identifiers:
- The Open Library ID: ➤ OL27992254M - OL27976673M - OL37235292M - OL28224488M - OL30458666M - OL28165191M - OL30090334M - OL28229228M
- All ISBNs: ➤ 9811508704 - 9789811329067 - 3662486822 - 9811329060 - 9811027420 - 9811054207 - 9783662456705 - 9789811508707 - 9783662486825 - 9811027404 - 9789811027406 - 9789811027420 - 3662456699 - 9789811054204 - 3662456702 - 9783662456699
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Applications and Techniques in Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Communications and Multimedia Security
By Bart De Decker and David W. Chadwick

“Communications and Multimedia Security” Metadata:
- Title: ➤ Communications and Multimedia Security
- Authors: Bart De DeckerDavid W. Chadwick
- Language: English
- Number of Pages: Median: 263
- Publisher: ➤ Springer London, Limited - Springer Berlin / Heidelberg - Springer
- Publish Date: 2010 - 2012 - 2013 - 2014
“Communications and Multimedia Security” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Telecommunication systems - Computer security - Computer science - Data encryption (Computer science) - Computer Communication Networks - Data protection - Biometrics - Information Systems - Systems and Data Security - E-Commerce/e-business - Data Encryption - Management of Computing and Information Systems
Edition Identifiers:
- The Open Library ID: ➤ OL30620108M - OL34466769M - OL36215006M - OL36208391M - OL28004474M - OL37229240M
- All ISBNs: ➤ 9783642407796 - 3662448858 - 9783662448847 - 3642328040 - 9783662448854 - 9783642132414 - 366244884X - 9783642407789 - 364240779X - 3642407781 - 9783642328046 - 3642132413
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Communications and Multimedia Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Policies and Research in Identity Management
By Simone Fischer-Hübner

“Policies and Research in Identity Management” Metadata:
- Title: ➤ Policies and Research in Identity Management
- Author: Simone Fischer-Hübner
- Language: English
- Number of Pages: Median: 166
- Publisher: ➤ Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2010 - 2013 - 2014 - 2015
- Publish Location: Berlin, Heidelberg
“Policies and Research in Identity Management” Subjects and Themes:
- Subjects: ➤ Information Systems - Software engineering - Systems and Data Security - Data protection - Data encryption (Computer science) - Data Encryption - Computer science - Management of Computing and Information Systems - Biometrics - Special Purpose and Application-Based Systems - Computer networks, security measures - Computers, congresses - Research
Edition Identifiers:
- The Open Library ID: ➤ OL37394832M - OL37390210M - OL28953783M - OL28120537M - OL28028288M - OL27081678M
- All ISBNs: ➤ 9780387779966 - 9783642173035 - 0387779965 - 9781441946096 - 9783642423819 - 9783642372827 - 1441946098 - 9783642431159 - 3642431151 - 3642173039 - 3642372821 - 3642423817
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Policies and Research in Identity Management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Engineering Secure Software and Systems
By Jan Jürjens

“Engineering Secure Software and Systems” Metadata:
- Title: ➤ Engineering Secure Software and Systems
- Author: Jan Jürjens
- Language: English
- Number of Pages: Median: 244
- Publisher: ➤ Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2013 - 2014
- Publish Location: Berlin, Heidelberg
“Engineering Secure Software and Systems” Subjects and Themes:
- Subjects: ➤ Models and Principles - Software Engineering/Programming and Operating Systems - Cryptology and Information Theory Data Structures - Software engineering - Data structures (Computer science) - Math Applications in Computer Science - Computer Communication Networks - Data Encryption - Computer science - Data encryption (Computer science) - Computer security - Congresses - Computer networks - Security measures - Computer networks, security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: OL37180274M - OL28305681M - OL28093176M - OL27996989M - OL27036423M
- Library of Congress Control Number (LCCN): 2013930843
- All ISBNs: ➤ 3642365647 - 3642365620 - 3642365639 - 9783642365645 - 9783642365638 - 3319048961 - 331904897X - 9783319048970 - 9783642365621 - 9783319048963
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Engineering Secure Software and Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Trust, Privacy and Security in Digital Business
By Steven Furnell

“Trust, Privacy and Security in Digital Business” Metadata:
- Title: ➤ Trust, Privacy and Security in Digital Business
- Author: Steven Furnell
- Language: English
- Number of Pages: Median: 236
- Publisher: ➤ Springer International Publishing AG - Springer-Verlag GmbH Berlin Heidelberg - Springer - Springer London, Limited
- Publish Date: ➤ 2011 - 2012 - 2013 - 2018 - 2022
- Publish Location: Berlin, Heidelberg
“Trust, Privacy and Security in Digital Business” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Computer networks - Information systems - Computer science - Computer software - Business enterprises, computer networks - Computer security - Business enterprises - Electronic commerce - Privacy, right of - Congresses - Security measures - Internet - Commerce électronique - Congrès - Sécurité - Mesures - Réseaux d'ordinateurs - Informatique - Algorithm Analysis and Problem Complexity - Computers and Society - Data Encryption - Management of Computing and Information Systems - Computer Communication Networks - Information Systems Applications (incl.Internet) - Artificial Intelligence (incl. Robotics) - Database management - Data mining - Artificial intelligence - Data Mining and Knowledge Discovery
Edition Identifiers:
- The Open Library ID: ➤ OL39553066M - OL37229131M - OL30372204M - OL28260367M - OL28212930M - OL25552699M
- Online Computer Library Center (OCLC) ID: 755995662
- All ISBNs: ➤ 9783319983844 - 9783031179259 - 3031179250 - 9783642228902 - 3642403425 - 3642403433 - 3642228917 - 3642228895 - 9783642403422 - 9783642228896 - 3642228909 - 3319983849 - 9783642403439 - 9783642228919
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trust, Privacy and Security in Digital Business at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Prime numbers and computer methods for factorization
By Hans Riesel

“Prime numbers and computer methods for factorization” Metadata:
- Title: ➤ Prime numbers and computer methods for factorization
- Author: Hans Riesel
- Language: English
- Number of Pages: Median: 484
- Publisher: ➤ Brand: Birkhäuser - Springer - Birkhäuser Boston - Birkhuser Boston - Birkhäuser - Birkhauser Verlag
- Publish Date: 1994 - 2011 - 2012 - 2014
- Publish Location: Boston
“Prime numbers and computer methods for factorization” Subjects and Themes:
- Subjects: ➤ Numbers, prime - Mathematics, data processing - Algorithms - Number theory - Mathematics - Data encryption (Computer science) - Data Encryption - Applications of Mathematics - Mathematics, general - Computer science - Computational Mathematics and Numerical Analysis
Edition Identifiers:
- The Open Library ID: ➤ OL51574185M - OL37150959M - OL36727813M - OL28129427M - OL28050785M - OL17413228M
- All ISBNs: ➤ 1283444429 - 0817682988 - 9780817682989 - 9780817682996 - 3764337435 - 0817682996 - 9781461266815 - 9783764337438 - 1461266815 - 9781461202516 - 9781283444422 - 1461202515
Access and General Info:
- First Year Published: 1994
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Prime numbers and computer methods for factorization at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Recent Trends in Computer Networks and Distributed Systems Security
By Sabu M. Thampi

“Recent Trends in Computer Networks and Distributed Systems Security” Metadata:
- Title: ➤ Recent Trends in Computer Networks and Distributed Systems Security
- Author: Sabu M. Thampi
- Language: English
- Number of Pages: Median: 532
- Publisher: ➤ Springer London, Limited - Springer Berlin / Heidelberg - Springer Berlin Heidelberg - Springer - Imprint: Springer
- Publish Date: 2012 - 2014
- Publish Location: Berlin, Heidelberg
“Recent Trends in Computer Networks and Distributed Systems Security” Subjects and Themes:
- Subjects: ➤ Systems and Data Security - Computer software - Computer networks - Computer science - Algorithm Analysis and Problem Complexity - Coding theory - Data protection - Data Encryption - Coding and Information Theory - Data encryption (Computer science) - Congresses - Security measures - Computer networks, security measures - Electronic data processing, distributed processing - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL37236608M - OL34479315M - OL30619379M - OL28065342M - OL27084739M
- Online Computer Library Center (OCLC) ID: 870290465
- Library of Congress Control Number (LCCN): 2014932169
- All ISBNs: ➤ 9783642545252 - 9783642545245 - 9783642341342 - 3642341365 - 9783642341366 - 3642545246 - 3642545254 - 3642341357 - 9783642341359 - 3642341349
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Recent Trends in Computer Networks and Distributed Systems Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Security, Privacy, and Applied Cryptography Engineering
By Rajat Subhra Chakraborty, Peter Schwabe and Jon Solworth
“Security, Privacy, and Applied Cryptography Engineering” Metadata:
- Title: ➤ Security, Privacy, and Applied Cryptography Engineering
- Authors: Rajat Subhra ChakrabortyPeter SchwabeJon Solworth
- Language: English
- Number of Pages: Median: 373
- Publisher: ➤ Springer International Publishing AG - Springer London, Limited
- Publish Date: 2014 - 2015
“Security, Privacy, and Applied Cryptography Engineering” Subjects and Themes:
- Subjects: ➤ Computer security - Cryptography - Computer science - Data encryption (Computer science) - Computer Communication Networks - Data protection - Information Systems - Systems and Data Security - Data Encryption - Management of Computing and Information Systems
Edition Identifiers:
- The Open Library ID: OL34526422M - OL36214981M - OL34524217M - OL36208708M
- All ISBNs: ➤ 9783319241258 - 9783319120591 - 3319241265 - 9783319120607 - 331912059X - 3319120603 - 3319241257 - 9783319241265
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Security, Privacy, and Applied Cryptography Engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Trustworthy Computing and Services
By Yuyu Yuan, Xu Wu and Yueming Lu

“Trustworthy Computing and Services” Metadata:
- Title: ➤ Trustworthy Computing and Services
- Authors: Yuyu YuanXu WuYueming Lu
- Language: English
- Number of Pages: Median: 760
- Publisher: ➤ Springer Berlin / Heidelberg - Springer - Springer London, Limited - Brand: Springer
- Publish Date: 2013 - 2014
“Trustworthy Computing and Services” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks, security measures - Data encryption (computer science) - Computer science - Data protection - Systems and Data Security - Database management - Software engineering - Operating systems (Computers) - Computer Communication Networks - Operating Systems - Data Encryption
Edition Identifiers:
- The Open Library ID: OL28016441M - OL28259852M - OL37235682M - OL37182679M - OL37235693M
- All ISBNs: ➤ 9783662439081 - 3662439085 - 9783642357954 - 9783642357947 - 3642357962 - 3662439077 - 9783662439074 - 3642357946 - 9783642357961 - 3642357954
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trustworthy Computing and Services at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Introduction to Biometrics
By Anil K. Jain

“Introduction to Biometrics” Metadata:
- Title: Introduction to Biometrics
- Author: Anil K. Jain
- Language: English
- Number of Pages: Median: 328
- Publisher: ➤ Springer - Springer International Publishing AG - Springer Science+Business Media, LLC
- Publish Date: 2011 - 2014 - 2024
- Publish Location: Boston, MA
“Introduction to Biometrics” Subjects and Themes:
- Subjects: ➤ Computer Imaging, Vision, Pattern Recognition and Graphics - Pattern perception - Image Processing and Computer Vision - Cryptology and Information Theory Data Structures - Optical pattern recognition - Multimedia systems - Data structures (Computer science) - Computer vision - Data Encryption - Computer science - Data encryption (Computer science) - Biometry - Pattern recognition systems - Anthropometry - Biometric identification
Edition Identifiers:
- The Open Library ID: OL51797641M - OL27980030M - OL25548019M - OL51810512M
- Library of Congress Control Number (LCCN): 2011942231
- All ISBNs: ➤ 9780387773261 - 9783031616747 - 3031643941 - 9780387773254 - 1489985433 - 0387773258 - 9781489985439 - 303161674X - 9783031643941 - 0387773266
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Introduction to Biometrics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Privacy and Identity Management for Life
By Jan Camenisch

“Privacy and Identity Management for Life” Metadata:
- Title: ➤ Privacy and Identity Management for Life
- Author: Jan Camenisch
- Language: English
- Number of Pages: Median: 308
- Publisher: ➤ Springer - Springer-Verlag Berlin Heidelberg
- Publish Date: 2011 - 2012 - 2014
- Publish Location: Berlin, Heidelberg
“Privacy and Identity Management for Life” Subjects and Themes:
- Subjects: ➤ Information systems - Data encryption (Computer science) - Economics - Management information systems - Law and legislation - Computers - Computer network resources - Identification - Right of Privacy - Computer security - Data protection - Internet, security measures - Information Systems Applications (incl. Internet) - Computer science - Computer Communication Networks - Computer software - Information Systems - Management of Computing and Information Systems - Data Encryption - Computers and Society - Algorithm Analysis and Problem Complexity
Edition Identifiers:
- The Open Library ID: OL35937309M - OL28265883M - OL28150013M - OL28129297M - OL25547660M
- Library of Congress Control Number (LCCN): 2011930188
- All ISBNs: ➤ 3642433138 - 9783642316692 - 9783642316685 - 3642316697 - 3642203167 - 3642203175 - 9783642203176 - 3642316689 - 9783642442032 - 9783642433139 - 364244203X - 9783642203169
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy and Identity Management for Life at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Privacy and Identity Management for Life
By Simone Fischer-Hübner

“Privacy and Identity Management for Life” Metadata:
- Title: ➤ Privacy and Identity Management for Life
- Author: Simone Fischer-Hübner
- Language: English
- Number of Pages: Median: 347
- Publisher: ➤ Springer - Springer Berlin / Heidelberg - IFIP International Federation for Information Processing
- Publish Date: 2010 - 2011 - 2013 - 2014
- Publish Location: Berlin, Heidelberg
“Privacy and Identity Management for Life” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Computer networks - Information systems - Computer science - Computer software - Data protection - Computer security - Internet, security measures - Algorithm Analysis and Problem Complexity - Computers and Society - Data Encryption - Management of Computing and Information Systems - Computer Communication Networks - Information Systems - Information Systems Applications (incl.Internet)
Edition Identifiers:
- The Open Library ID: OL37390213M - OL35782202M - OL28109352M - OL27964696M - OL25534647M
- All ISBNs: ➤ 9783642267987 - 3642207685 - 9783642207709 - 9783642207693 - 364226798X - 3642422535 - 9783642142826 - 3642142826 - 3642207693 - 3642207707 - 9783642422539 - 9783642207686
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy and Identity Management for Life at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Multivariate public key cryptosystems
By Jintai Ding, Jason E. Gower and Dieter Schmidt

“Multivariate public key cryptosystems” Metadata:
- Title: ➤ Multivariate public key cryptosystems
- Authors: Jintai DingJason E. GowerDieter Schmidt
- Language: English
- Number of Pages: Median: 260
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2006 - 2008 - 2010 - 2020
“Multivariate public key cryptosystems” Subjects and Themes:
- Subjects: ➤ Computers - Data encryption (Computer science) - Computer security - Access control - Cryptography - Information theory - Computers, access control - Quantum theory - Computer science - Data structures (Computer science) - Coding theory - Cryptology and Information Theory Data Structures - Data Encryption - Coding and Information Theory - Data Structures - Mathematics of Computing - Theory of Computation
Edition Identifiers:
- The Open Library ID: OL35750675M - OL34371060M - OL29511683M - OL28240116M - OL7445386M
- Online Computer Library Center (OCLC) ID: 65764987
- Library of Congress Control Number (LCCN): 2006285715
- All ISBNs: ➤ 1071609858 - 9780387322292 - 0387369465 - 1441940774 - 9780387512167 - 9781441940773 - 0387322299 - 0387512160 - 9780387369464 - 9781071609859
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Multivariate public key cryptosystems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Information Security and Privacy
By Colin Boyd

“Information Security and Privacy” Metadata:
- Title: ➤ Information Security and Privacy
- Author: Colin Boyd
- Language: English
- Number of Pages: Median: 488
- Publisher: ➤ Imprint: Springer - Springer - Springer London, Limited - Springer Berlin Heidelberg
- Publish Date: 2005 - 2006 - 2009 - 2013
- Publish Location: Berlin, Heidelberg
“Information Security and Privacy” Subjects and Themes:
- Subjects: ➤ Information systems - Systems and Data Security - E-Commerce/e-business - Data protection - Data encryption (Computer science) - Computer Appl. in Administrative Data Processing - Computer science - Management of Computing and Information Systems - Coding theory - Data Encryption - Coding and Information Theory
Edition Identifiers:
- The Open Library ID: OL34472544M - OL34456812M - OL30531247M - OL28260304M - OL27045487M
- All ISBNs: ➤ 3642390609 - 9783540316848 - 9783540450306 - 3540316841 - 3642390595 - 9783642026218 - 9783642390593 - 9783642390609 - 3540450300 - 3642026214
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Information Security and Privacy
By Willy Susilo

“Information Security and Privacy” Metadata:
- Title: ➤ Information Security and Privacy
- Author: Willy Susilo
- Language: English
- Number of Pages: Median: 848
- Publisher: ➤ Springer London, Limited - Springer Berlin Heidelberg - Springer - Springer International Publishing AG - Imprint: Springer
- Publish Date: 2012 - 2014 - 2018 - 2024
- Publish Location: Berlin, Heidelberg
“Information Security and Privacy” Subjects and Themes:
- Subjects: ➤ Information systems - Systems and Data Security - E-Commerce/e-business - Data protection - Data encryption (Computer science) - Computer Appl. in Administrative Data Processing - Computer science - Management of Computing and Information Systems - Coding theory - Data Encryption - Coding and Information Theory - Computer security - Information Systems
Edition Identifiers:
- The Open Library ID: OL52561500M - OL36214962M - OL36207127M - OL28322758M - OL27045492M
- All ISBNs: ➤ 9783319083438 - 3319936379 - 9789819750276 - 981975027X - 3319083449 - 9783642314483 - 3642314481 - 9783319083445 - 9783319936376 - 3319083430
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Trust, Privacy and Security in Digital Business
By Simone Fischer-Hübner

“Trust, Privacy and Security in Digital Business” Metadata:
- Title: ➤ Trust, Privacy and Security in Digital Business
- Author: Simone Fischer-Hübner
- Language: English
- Number of Pages: Median: 252
- Publisher: ➤ Springer - Springer Berlin Heidelberg - Imprint: Springer - Springer London, Limited - Springer Berlin / Heidelberg
- Publish Date: 2012 - 2015 - 2017
- Publish Location: Berlin, Heidelberg
“Trust, Privacy and Security in Digital Business” Subjects and Themes:
- Subjects: ➤ Information systems - Systems and Data Security - Computer networks - Information Systems Applications (incl. Internet) - Data protection - Computer Appl. in Administrative Data Processing - Computer science - Management of Computing and Information Systems - Data Encryption - Data encryption (Computer science) - Business enterprises, computer networks - Computer security - Electronic commerce - Congresses - Security measures - Internet - Commerce électronique - Congrès - Sécurité - Mesures - Sécurité informatique - Réseaux d'ordinateurs - Informatique - Computer Communication Networks - Information Systems
Edition Identifiers:
- The Open Library ID: OL36218765M - OL36200248M - OL28213477M - OL27954675M - OL27092987M
- Online Computer Library Center (OCLC) ID: 808634201
- All ISBNs: ➤ 3319644823 - 9783319229058 - 9783642322877 - 3319229060 - 9783319229065 - 3319229052 - 3642322867 - 3642322875 - 9783319644820 - 9783642322860
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trust, Privacy and Security in Digital Business at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Advances in Cryptology - CRYPTO 2013
By Ran Canetti and Juan A. Garay
“Advances in Cryptology - CRYPTO 2013” Metadata:
- Title: ➤ Advances in Cryptology - CRYPTO 2013
- Authors: Ran CanettiJuan A. Garay
- Language: English
- Number of Pages: Median: 567
- Publisher: ➤ Springer - Springer Berlin / Heidelberg - Springer London, Limited
- Publish Date: 2013
“Advances in Cryptology - CRYPTO 2013” Subjects and Themes:
- Subjects: ➤ Computer science - Data encryption (Computer science) - Data protection - Computer software - Computational complexity - Data Encryption - Systems and Data Security - Algorithm Analysis and Problem Complexity - Discrete Mathematics in Computer Science - Computer Science, general
Edition Identifiers:
- The Open Library ID: OL34520737M - OL34520757M - OL30545203M - OL34490536M
- All ISBNs: ➤ 3642400418 - 9783642400858 - 3642400833 - 3642400841 - 9783642400414 - 364240085X - 9783642400841 - 9783642400834
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Cryptology - CRYPTO 2013 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Network Science and Cybersecurity
By Robinson E. Pino

“Network Science and Cybersecurity” Metadata:
- Title: ➤ Network Science and Cybersecurity
- Author: Robinson E. Pino
- Language: English
- Number of Pages: Median: 285
- Publisher: ➤ Springer - Springer Science+Business Media - Springer London, Limited
- Publish Date: 2013 - 2014 - 2015
- Publish Location: New York
“Network Science and Cybersecurity” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Internet - Computer security - Computer networks - Data protection - Internet, security measures - Computer science - Data encryption (Computer science) - Data structures (Computer science) - Computer Communication Networks - Telecommunication - Systems and Data Security - Data Encryption - Cryptology and Information Theory Data Structures - Networks Communications Engineering
Edition Identifiers:
- The Open Library ID: OL31013163M - OL35499841M - OL29308731M - OL27968752M
- Online Computer Library Center (OCLC) ID: 835373463
- Library of Congress Control Number (LCCN): 2013942470
- All ISBNs: ➤ 1461475961 - 9781489990655 - 9781461475989 - 9781461475965 - 1489990658 - 1461475988 - 146147597X - 9781461475972
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Network Science and Cybersecurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27The Hash Function BLAKE
By Jean-Philippe Aumasson, Willi Meier, Raphael C.-W Phan and Luca Henzen

“The Hash Function BLAKE” Metadata:
- Title: The Hash Function BLAKE
- Authors: Jean-Philippe AumassonWilli MeierRaphael C.-W PhanLuca Henzen
- Language: English
- Number of Pages: Median: 238
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2014 - 2015 - 2016
“The Hash Function BLAKE” Subjects and Themes:
- Subjects: ➤ Data encryption (computer science) - Computer science - Data protection - Computer software - Data Encryption - Systems and Data Security - Algorithm Analysis and Problem Complexity - Security Science and Technology
Edition Identifiers:
- The Open Library ID: OL34383437M - OL28169501M - OL35805732M
- All ISBNs: ➤ 9783662447567 - 3662525976 - 9783662447574 - 3662447576 - 3662447568 - 9783662525975
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Hash Function BLAKE at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Privacy Enhancing Technologies
By Emiliano De Cristofaro and Steven J. Murdoch

“Privacy Enhancing Technologies” Metadata:
- Title: Privacy Enhancing Technologies
- Authors: Emiliano De CristofaroSteven J. Murdoch
- Language: English
- Number of Pages: Median: 310
- Publisher: ➤ Springer Berlin / Heidelberg - Springer - Springer London, Limited
- Publish Date: 2013 - 2014
“Privacy Enhancing Technologies” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks, security measures - Congresses - Computer science - Data encryption (Computer science) - Data protection - Information Systems - Systems and Data Security - Computers and Society - Data Encryption - Management of Computing and Information Systems - E-Commerce/e-business
Edition Identifiers:
- The Open Library ID: OL37229147M - OL27982727M - OL27966380M - OL35782203M
- All ISBNs: ➤ 9783319085067 - 9783319085050 - 3319085069 - 3319085050 - 9783642390760 - 3642390765 - 9783642390784 - 3642390781
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Privacy Enhancing Technologies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Unauthorized Access
By Robert Sloan
“Unauthorized Access” Metadata:
- Title: Unauthorized Access
- Author: Robert Sloan
- Language: English
- Number of Pages: Median: 398
- Publisher: ➤ Taylor & Francis Group - Taylor & Francis
- Publish Date: 2013 - 2014 - 2017
“Unauthorized Access” Subjects and Themes:
- Subjects: ➤ Games development & programming - Data encryption - Computer security - Data mining
Edition Identifiers:
- The Open Library ID: OL31374782M - OL33494482M - OL31374039M - OL34633926M
- All ISBNs: 15148 - 1299875696 - 9781299875692 - 1138436925 - 9781138436923
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Unauthorized Access at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Advances in Cryptology -- CRYPTO 2014
By Juan A. Garay and Rosario Gennaro

“Advances in Cryptology -- CRYPTO 2014” Metadata:
- Title: ➤ Advances in Cryptology -- CRYPTO 2014
- Authors: Juan A. GarayRosario Gennaro
- Language: English
- Number of Pages: Median: 574
- Publisher: ➤ Springer London, Limited - Springer Berlin / Heidelberg - Springer
- Publish Date: 2014
“Advances in Cryptology -- CRYPTO 2014” Subjects and Themes:
- Subjects: ➤ Computer security - Cryptography - Computer science - Data encryption (Computer science) - Data protection - Computer software - Computational complexity - Data Encryption - Systems and Data Security - Algorithm Analysis and Problem Complexity - Discrete Mathematics in Computer Science
Edition Identifiers:
- The Open Library ID: OL35799253M - OL34520640M - OL28041952M - OL34505319M
- All ISBNs: ➤ 3662443813 - 9783662443705 - 3662443708 - 9783662443811 - 3662443805 - 9783662443804 - 3662443716 - 9783662443712
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Cryptology -- CRYPTO 2014 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Computer Security -- ESORICS 2013
By Jason Crampton, Sushil Jajodia and Keith Mayes

“Computer Security -- ESORICS 2013” Metadata:
- Title: ➤ Computer Security -- ESORICS 2013
- Authors: Jason CramptonSushil JajodiaKeith Mayes
- Language: English
- Number of Pages: Median: 813
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2013
“Computer Security -- ESORICS 2013” Subjects and Themes:
- Subjects: ➤ Computer security - Computer science - Data encryption (Computer science) - Computer Communication Networks - Data protection - Information Systems - Systems and Data Security - Data Encryption - Management of Computing and Information Systems - E-Commerce/e-business
Edition Identifiers:
- The Open Library ID: OL37228965M - OL28136414M - OL31373537M
- All ISBNs: ➤ 9783642402043 - 9783642402036 - 364240202X - 3642402046 - 9783642402029 - 3642402038
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Security -- ESORICS 2013 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Open Problems in Network Security
By Jan Camenisch

“Open Problems in Network Security” Metadata:
- Title: ➤ Open Problems in Network Security
- Author: Jan Camenisch
- Language: English
- Number of Pages: Median: 134
- Publisher: ➤ Springer Berlin Heidelberg - Springer London, Limited - Springer
- Publish Date: 2012 - 2013 - 2016
- Publish Location: Berlin, Heidelberg
“Open Problems in Network Security” Subjects and Themes:
- Subjects: ➤ Information Systems - Systems and Data Security - Computers and Society - Computer networks - Data protection - Data Encryption - Computer science - Management of Computing and Information Systems - Information Systems Applications (incl. Internet) - Data encryption (Computer science) - Computer networks, security measures - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL27078737M - OL28015725M - OL30512809M - OL34534618M
- All ISBNs: ➤ 3642275850 - 9783642275869 - 3319390287 - 9783642275852 - 9783319390284 - 9783319390277 - 3319390279 - 3642275869
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Open Problems in Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Advances in Cryptology -- ASIACRYPT 2014
By Palash Sarkar and Tetsu Iwata

“Advances in Cryptology -- ASIACRYPT 2014” Metadata:
- Title: ➤ Advances in Cryptology -- ASIACRYPT 2014
- Authors: Palash SarkarTetsu Iwata
- Language: English
- Number of Pages: Median: 561
- Publisher: ➤ Springer London, Limited - Springer - Springer Berlin / Heidelberg
- Publish Date: 2014
“Advances in Cryptology -- ASIACRYPT 2014” Subjects and Themes:
- Subjects: ➤ Cryptography - Computer security - Computer science - Data encryption (Computer science) - Data protection - Coding theory - Information theory - Information Systems - Data Encryption - Systems and Data Security - Coding and Information Theory - Management of Computing and Information Systems - Theory of Computation - Mathematics of Computing
Edition Identifiers:
- The Open Library ID: OL37228765M - OL28108100M - OL36211406M - OL37229324M
- All ISBNs: ➤ 3662456109 - 3662456087 - 3662456079 - 9783662456118 - 3662456117 - 9783662456101 - 9783662456071 - 9783662456088
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Cryptology -- ASIACRYPT 2014 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Security Standardisation Research
By Lidong Chen, David McGrew and Chris Mitchell

“Security Standardisation Research” Metadata:
- Title: ➤ Security Standardisation Research
- Authors: Lidong ChenDavid McGrewChris Mitchell
- Language: English
- Number of Pages: Median: 257
- Publisher: ➤ Springer - Springer London, Limited - Springer International Publishing AG
- Publish Date: 2014 - 2016 - 2020
“Security Standardisation Research” Subjects and Themes:
- Subjects: ➤ Computer security - Computer science - Computer Communication Networks - Data protection - Data structures (Computer science) - Data encryption (Computer science) - Systems and Data Security - Data Encryption - Data Structures - Math Applications in Computer Science
Edition Identifiers:
- The Open Library ID: OL34511084M - OL31948723M - OL34520822M - OL28134810M
- All ISBNs: ➤ 9783030643560 - 3319140531 - 3030643565 - 331914054X - 9783319490991 - 9783319140537 - 3319490990 - 9783319140544
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security Standardisation Research at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Computer Security - ESORICS 2014
By Miroslaw Kutylowski and Jaideep Vaidya

“Computer Security - ESORICS 2014” Metadata:
- Title: ➤ Computer Security - ESORICS 2014
- Authors: Miroslaw KutylowskiJaideep Vaidya
- Language: English
- Number of Pages: Median: 532
- Publisher: ➤ Springer London, Limited - Springer - Springer International Publishing AG
- Publish Date: 2014
“Computer Security - ESORICS 2014” Subjects and Themes:
- Subjects: ➤ Computer security - Data encryption (computer science) - Data protection - Computer science - Data encryption (Computer science) - Information Systems - Systems and Data Security - Data Encryption - Management of Computing and Information Systems
Edition Identifiers:
- The Open Library ID: OL36214937M - OL36215019M - OL28143347M - OL36208333M
- All ISBNs: ➤ 9783319112114 - 3319112031 - 9783319112022 - 9783319112039 - 3319112023 - 3319112112 - 3319112120 - 9783319112121
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Security - ESORICS 2014 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Moving Target Defense II
By Sushil Jajodia

“Moving Target Defense II” Metadata:
- Title: Moving Target Defense II
- Author: Sushil Jajodia
- Language: English
- Number of Pages: Median: 210
- Publisher: ➤ Springer New York - Imprint: Springer - Brand: Springer - Springer
- Publish Date: 2012 - 2013 - 2014
- Publish Location: New York, NY
“Moving Target Defense II” Subjects and Themes:
- Subjects: ➤ Cryptology and Information Theory Data Structures - Telecommunication - Systems and Data Security - Computer networks - Data structures (Computer science) - Networks Communications Engineering - Data Encryption - Computer science - Data protection - Data encryption (Computer science) - Computer networks, security measures - Computer security - Game theory - Security measures - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL28131430M - OL27076028M - OL27999797M - OL28158597M
- Library of Congress Control Number (LCCN): 2012540870
- All ISBNs: ➤ 9781461454175 - 9781461454151 - 1461454158 - 1461454174 - 9781461454168 - 1489993169 - 1461454166 - 9781489993168
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Moving Target Defense II at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Data Privacy Management and Autonomous Spontaneous Security
By Joaquin Garcia-Alfaro

“Data Privacy Management and Autonomous Spontaneous Security” Metadata:
- Title: ➤ Data Privacy Management and Autonomous Spontaneous Security
- Author: Joaquin Garcia-Alfaro
- Language: English
- Number of Pages: Median: 258
- Publisher: ➤ Springer London, Limited - Springer Berlin / Heidelberg - Springer Berlin Heidelberg - Springer
- Publish Date: 2010 - 2011 - 2014
- Publish Location: Berlin, Heidelberg
“Data Privacy Management and Autonomous Spontaneous Security” Subjects and Themes:
- Subjects: ➤ Computer networks - Information systems - Operating systems (Computers) - Data encryption (Computer science) - Computer science - Securities - Congresses - Computer security - Data protection - Information technology - Computers - Access control - Operating Systems - Computer Communication Networks - Computers and Society - Data Encryption - Management of Computing and Information Systems - Information Systems Applications (incl.Internet)
Edition Identifiers:
- The Open Library ID: OL25541755M - OL36214956M - OL37140707M - OL36205841M
- Online Computer Library Center (OCLC) ID: 706409828
- Library of Congress Control Number (LCCN): 2011921004
- All ISBNs: ➤ 3642545688 - 364254567X - 3642193471 - 9783642193477 - 9783642193484 - 9783642112072 - 3642112072 - 9783642545689 - 9783642545672 - 364219348X
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Data Privacy Management and Autonomous Spontaneous Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Computer Applications for Security, Control and System Engineering
By Tai-hoon Kim

“Computer Applications for Security, Control and System Engineering” Metadata:
- Title: ➤ Computer Applications for Security, Control and System Engineering
- Author: Tai-hoon Kim
- Language: English
- Number of Pages: Median: 508
- Publisher: ➤ Brand: Springer - Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2012
- Publish Location: Berlin, Heidelberg
“Computer Applications for Security, Control and System Engineering” Subjects and Themes:
- Subjects: ➤ Information Systems - Computers and Society - Computer networks - Algorithm Analysis and Problem Complexity - Information Systems Applications (incl. Internet) - Data encryption (Computer science) - Management of Computing and Information Systems - Data Encryption - Computer software - Computer science - Computer security - Computer networks, security measures - Computer Communication Networks
Edition Identifiers:
- The Open Library ID: OL29350991M - OL28024795M - OL27026075M
- All ISBNs: ➤ 3642352634 - 3642352642 - 3642352650 - 9783642352638 - 9783642352652 - 9783642352645
Author's Alternative Names:
"Tai-Hoon Kim"Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer Applications for Security, Control and System Engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Netzwerk- und Datensicherheit
By Martin Kappes

“Netzwerk- und Datensicherheit” Metadata:
- Title: Netzwerk- und Datensicherheit
- Author: Martin Kappes
- Language: ger
- Number of Pages: Median: 362
- Publisher: ➤ Springer Fachmedien Wiesbaden GmbH - Springer Vieweg - Imprint: Springer Vieweg - Springer Fachmedien Wiesbaden
- Publish Date: 2013 - 2021
- Publish Location: Wiesbaden
“Netzwerk- und Datensicherheit” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Data Encryption - Systems and Data Security - Computer Systems Organization and Communication Networks - Computer network architectures - Data protection - Computer science
Edition Identifiers:
- The Open Library ID: OL37127772M - OL28051264M - OL27076932M
- All ISBNs: ➤ 9783834886125 - 3834886122 - 3834806366 - 3658161264 - 9783834806369 - 9783658161262
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Netzwerk- und Datensicherheit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Ad Hoc Networks
By Jun Zheng

“Ad Hoc Networks” Metadata:
- Title: Ad Hoc Networks
- Author: Jun Zheng
- Language: English
- Number of Pages: Median: 350
- Publisher: ➤ Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2010 - 2013 - 2018 - 2020
- Publish Location: Berlin, Heidelberg
“Ad Hoc Networks” Subjects and Themes:
- Subjects: ➤ Systems and Data Security - Data protection - Algorithm Analysis and Problem Complexity - Computer Communication Networks - Data Encryption - Data encryption (Computer science) - Computer software - Computer science - Computer networks
Edition Identifiers:
- The Open Library ID: OL30492279M - OL30099857M - OL27945314M - OL27014466M
- All ISBNs: ➤ 9783642117763 - 3030058875 - 9783030372613 - 3030372618 - 9783642369582 - 3642117767 - 3642369588 - 9783030058876
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Ad Hoc Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Security and Privacy in Communication Networks
By Angelos D. Keromytis

“Security and Privacy in Communication Networks” Metadata:
- Title: ➤ Security and Privacy in Communication Networks
- Author: Angelos D. Keromytis
- Language: English
- Number of Pages: Median: 380
- Publisher: ➤ Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2013
- Publish Location: Berlin, Heidelberg
“Security and Privacy in Communication Networks” Subjects and Themes:
- Subjects: ➤ Information Systems - Systems and Data Security - Computers and Society - Data protection - Computer Communication Networks - Data Encryption - Computer science - Management of Computing and Information Systems - Information Systems Applications (incl. Internet) - Data encryption (Computer science) - Telecommunication systems - Congresses - Security measures - Computer networks - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL30534462M - OL28014996M - OL27086849M
- Library of Congress Control Number (LCCN): 2013931847
- All ISBNs: ➤ 3642368840 - 9783642368820 - 3642368832 - 3642368824 - 9783642368844 - 9783642368837
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security and Privacy in Communication Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Security and Privacy Protection in Information Processing Systems
By Lech J. Janczewski

“Security and Privacy Protection in Information Processing Systems” Metadata:
- Title: ➤ Security and Privacy Protection in Information Processing Systems
- Author: Lech J. Janczewski
- Language: English
- Number of Pages: Median: 449
- Publisher: ➤ Springer - Imprint: Springer - Springer Berlin Heidelberg
- Publish Date: 2013 - 2015
“Security and Privacy Protection in Information Processing Systems” Subjects and Themes:
- Subjects: ➤ Information Systems - Computers and Society - Algorithm Analysis and Problem Complexity - Computer Communication Networks - Data Encryption - Data encryption (Computer science) - Management of Computing and Information Systems - Information Systems Applications (incl. Internet) - Computer software - Computer science - Computer security - Data protection - Computer networks, security measures - Internet, security measures - Congresses
Edition Identifiers:
- The Open Library ID: OL29519691M - OL28050137M - OL28049382M - OL27086852M
- Library of Congress Control Number (LCCN): 2013941152
- All ISBNs: ➤ 3642392172 - 9783642392184 - 3642392180 - 3642392199 - 9783642392177 - 3642431399 - 9783642431395 - 9783642392191
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security and Privacy Protection in Information Processing Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Trusted Systems
By Liqun Chen

“Trusted Systems” Metadata:
- Title: Trusted Systems
- Author: Liqun Chen
- Language: English
- Number of Pages: Median: 313
- Publisher: ➤ Springer Berlin Heidelberg - Imprint: Springer - Springer - Springer London, Limited
- Publish Date: 2010 - 2011 - 2012
- Publish Location: Berlin, Heidelberg
“Trusted Systems” Subjects and Themes:
- Subjects: ➤ Information systems - Systems and Data Security - Computers and Society - Computer networks - Data protection - Data Encryption - Computer science - Management of Computing and Information Systems - Computer Appl. in Administrative Data Processing - Data encryption (Computer science) - Computer security - Congresses - Security measures - Computer networks, security measures - Data encryption (computer science) - Computer Communication Networks - Information Systems
Edition Identifiers:
- The Open Library ID: OL35776204M - OL34466854M - OL28019561M - OL27092980M
- Library of Congress Control Number (LCCN): 2012943158
- All ISBNs: ➤ 9783642145971 - 9783642322976 - 3642145973 - 9783642252839 - 3642322972 - 3642252834 - 9783642322983 - 3642322980
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trusted Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Brute force
By Matt Curtin

“Brute force” Metadata:
- Title: Brute force
- Author: Matt Curtin
- Language: English
- Number of Pages: Median: 292
- Publisher: ➤ Springer London, Limited - Copernicus Books - Springer
- Publish Date: 2005 - 2007 - 2010
- Publish Location: New York
“Brute force” Subjects and Themes:
- Subjects: ➤ Computer security - Data encryption (Computer science) - Science (General) - Coding theory - Computer science - Mathematics - Popular Science - Popular Science in Mathematics/Computer Science/Natural Science/Technology - Computers and Society - Data Encryption - Coding and Information Theory
Edition Identifiers:
- The Open Library ID: OL34371166M - OL37097980M - OL3309884M
- Library of Congress Control Number (LCCN): 2004058919
- All ISBNs: ➤ 1441918957 - 9780387201092 - 9780387271606 - 9781441918956 - 0387201092 - 0387271600
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Brute force at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Information Systems Security
By Venkat Venkatakrishnan and Diganta Goswami

“Information Systems Security” Metadata:
- Title: Information Systems Security
- Authors: Venkat VenkatakrishnanDiganta Goswami
- Language: English
- Number of Pages: Median: 363
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2012
“Information Systems Security” Subjects and Themes:
- Subjects: ➤ Computer security - Computers, access control - Information retrieval - Information organization - Information Systems Applications (incl. Internet) - Computer science - Data encryption (Computer science) - Computer Communication Networks - Data protection - Information storage and retrieval systems - Information Systems - Systems and Data Security - Management of Computing and Information Systems - Data Encryption
Edition Identifiers:
- The Open Library ID: OL37229221M - OL30623850M - OL34375240M
- All ISBNs: ➤ 9783642351297 - 9783642351310 - 3642351301 - 3642351298 - 364235131X - 9783642351303
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Systems Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Radio Frequency Identification : Security and Privacy Issues
By Michael Hutter and Jörn-Marc Schmidt

“Radio Frequency Identification : Security and Privacy Issues” Metadata:
- Title: ➤ Radio Frequency Identification : Security and Privacy Issues
- Authors: Michael HutterJörn-Marc Schmidt
- Language: English
- Number of Pages: Median: 192
- Publisher: Springer
- Publish Date: 2013 - 2014
“Radio Frequency Identification : Security and Privacy Issues” Subjects and Themes:
- Subjects: ➤ Computer science - Data protection - Data encryption (computer science) - Systems and Data Security - Data Encryption - E-Commerce/e-business
Edition Identifiers:
- The Open Library ID: OL30620367M - OL36206672M - OL31508086M
- All ISBNs: ➤ 9783642413339 - 3642413331 - 9783642413315 - 9783642413322 - 3642413315 - 3642413323
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Radio Frequency Identification : Security and Privacy Issues at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47Automated Firewall Analytics
By Ehab Al-Shaer

“Automated Firewall Analytics” Metadata:
- Title: Automated Firewall Analytics
- Author: Ehab Al-Shaer
- Language: English
- Number of Pages: Median: 139
- Publisher: Springer
- Publish Date: 2014 - 2016
“Automated Firewall Analytics” Subjects and Themes:
- Subjects: ➤ Computer security - Computer science - Data encryption (Computer science) - Computer Communication Networks - Data protection - Information systems - Systems and Data Security - Data Encryption - Information Systems and Communication Service
Edition Identifiers:
- The Open Library ID: OL34387660M - OL37194801M - OL29141355M
- All ISBNs: ➤ 9783319103709 - 9783319103716 - 3319103717 - 3319363573 - 9783319363578 - 3319103709
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Automated Firewall Analytics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Wireless Network Security
By Lei Chen, Jiahuang Ji and Zihong Zhang
“Wireless Network Security” Metadata:
- Title: Wireless Network Security
- Authors: Lei ChenJiahuang JiZihong Zhang
- Language: English
- Number of Pages: Median: 281
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: 2013
“Wireless Network Security” Subjects and Themes:
- Subjects: ➤ Computer science - Data encryption (Computer science) - Computer Communication Networks - Telecommunication - Data Encryption - Networks Communications Engineering
Edition Identifiers:
- The Open Library ID: OL30540773M - OL35518435M
- All ISBNs: 3642365124 - 3642365116 - 9783642365119 - 9783642365126
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Wireless Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Trust, Privacy, and Security in Digital Business
By Claudia Eckert, Sokratis K. Katsikas and Günther Pernul

“Trust, Privacy, and Security in Digital Business” Metadata:
- Title: ➤ Trust, Privacy, and Security in Digital Business
- Authors: Claudia EckertSokratis K. KatsikasGünther Pernul
- Language: English
- Number of Pages: Median: 205
- Publisher: ➤ Springer - Springer London, Limited - Springer International Publishing AG
- Publish Date: 2014 - 2019
“Trust, Privacy, and Security in Digital Business” Subjects and Themes:
- Subjects: ➤ Information resources management - Information storage and retrieval systems - Computer security - Computer science - Data encryption (Computer science) - Data protection - Information Systems - Systems and Data Security - Management of Computing and Information Systems - Data Encryption
Edition Identifiers:
- The Open Library ID: OL36214960M - OL34725953M - OL29361499M
- All ISBNs: ➤ 3319097709 - 9783319097695 - 3030278123 - 9783319097701 - 3319097695 - 9783030278120
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Trust, Privacy, and Security in Digital Business at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Sequences and Their Applications - SETA 2014
By Kai-Uwe Schmidt and Arne Winterhof

“Sequences and Their Applications - SETA 2014” Metadata:
- Title: ➤ Sequences and Their Applications - SETA 2014
- Authors: Kai-Uwe SchmidtArne Winterhof
- Language: English
- Number of Pages: Median: 326
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2014
“Sequences and Their Applications - SETA 2014” Subjects and Themes:
- Subjects: ➤ Sequences (mathematics) - Coding theory - Computer science - Data encryption (Computer science) - Computer Communication Networks - Computer software - Computational complexity - Information Systems - Discrete Mathematics in Computer Science - Algorithm Analysis and Problem Complexity - Data Encryption - Management of Computing and Information Systems - Coding and Information Theory
Edition Identifiers:
- The Open Library ID: OL28136358M - OL27968811M - OL34520907M
- All ISBNs: ➤ 3319123246 - 3319123254 - 9783319123257 - 3319123262 - 9783319123264 - 9783319123240
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Sequences and Their Applications - SETA 2014 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.