search for books and compare prices
Anup K. Ghosh has written 3 work(s)
Search for other authors with the same name
displaying 1 to 3 | at end
show results in order: alphabetically | oldest to newest | newest to oldest
Cover for 9780792373995 Cover for 9781461355687 Cover for 9780471384212 Cover for 9780471192237
cover image for 9781461355687
Product Description: Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information security and, two, to serve as a central reference and timely topics in information security research source for advanced and development...read more
By Anup K. Ghosh (editor)

Hardcover:

9780792373995 | Kluwer Academic Pub, September 1, 2001, cover price $199.00

Paperback:

9781461355687 | Springer-Verlag New York Inc, October 23, 2012, cover price $199.00 | About this edition: Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY.

cover image for 9780471384212
Explores external threats to e-commerce security, explaining how to implement security, coordinate system and business goals, and evaluate watchdog agencies. (view table of contents)

Paperback:

9780471384212 | John Wiley & Sons Inc, February 1, 2001, cover price $39.99 | About this edition: Explores external threats to e-commerce security, explaining how to implement security, coordinate system and business goals, and evaluate watchdog agencies.

cover image for 9780471192237
Explaining the business potential of Internet commerce and introducing a range of the core applications, this valuable guide explores the abilities and limitations of existing methods for securing data transactions and surveys unresolved issues and current research. Original. (Intermediate). (view table of contents)

Paperback:

9780471192237 | John Wiley & Sons Inc, January 1, 1998, cover price $34.99 | About this edition: Explaining the business potential of Internet commerce and introducing a range of the core applications, this valuable guide explores the abilities and limitations of existing methods for securing data transactions and surveys unresolved issues and current research.

displaying 1 to 3 | at end