search for books and compare prices
telecommunication security measures matches 8 work(s)
displaying 1 to 8 |
at end
show results in order: alphabetically | oldest to newest | newest to oldest
Detailing how C and C++++ programmers can use cryptography, the technique of enciphering and deciphering messages, to maintain the privacy of computer data, a guide shows how security can be built into software and systems used every day. Original.
(view table of contents)
Hardcover:
9780471597483, titled "The Systematic Identification of Organic Compounds" | John Wiley & Sons Inc, December 1, 1997, cover price $116.45 | also contains The Systematic Identification of Organic Compounds
Paperback:
9780471597568, titled "Applied Cryptography: Protocols, Algorithms, and Source Code in C" | John Wiley & Sons Inc, January 1, 1994, cover price $44.95 | also contains Applied Cryptography: Protocols, Algorithms, and Source Code in C | About this edition: Detailing how C and C++++ programmers can use cryptography, the technique of enciphering and deciphering messages, to maintain the privacy of computer data, a guide shows how security can be built into software and systems used every day.
Hardcover:
9781119096726, titled "Applied Cryptography: Protocols, Algorithms and Source Code in C" | 20 anv edition (John Wiley & Sons Inc, March 30, 2015), cover price $70.00
9780471128458 | 2 sub edition (John Wiley & Sons Inc, January 1, 1996), cover price $60.00
Paperback:
9780471117094 | 2 revised edition (John Wiley & Sons Inc, November 1, 1995), cover price $60.00 | About this edition: Provides a comprehensive, up-to-date survey of modern cryptographic terms and techniques, along with practical advice on how to implement a wide variety of impenetrable encryptions, including algorithms and source code.
9780471597568 | John Wiley & Sons Inc, January 1, 1994, cover price $44.95 | also contains We Should All Be Ecofeminists: Friends of the Earth | About this edition: Detailing how C and C++++ programmers can use cryptography, the technique of enciphering and deciphering messages, to maintain the privacy of computer data, a guide shows how security can be built into software and systems used every day.
9780440120872, titled "The Cardross Luck" | Reissue edition (Dell Pub Co, April 1, 1987), cover price $2.95 | also contains The Cardross Luck
Miscellaneous:
9781118081969 | 2 edition (John Wiley & Sons Inc, February 11, 2011), cover price $60.00
Paperback:
9781597499699 | Syngress Media Inc, November 19, 2013, cover price $74.95
Product Description: Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe...read more
Hardcover:
9780124071919 | Butterworth-Heinemann, March 14, 2013, cover price $79.95 | About this edition: Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis.
Hardcover:
9781466501386 | CRC Pr I Llc, December 6, 2012, cover price $109.95
Product Description: Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design...read more
Hardcover:
9781439840368 | Chapman & Hall, May 29, 2012, cover price $108.95 | About this edition: Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems.
Product Description: Over the past few decades, there has been numerous research studies conducted involving the synchronization of dynamical systems with several theoretical studies and laboratory experimentations demonstrating the pivotal role for this phenomenon in secure communications...read more
Hardcover:
9781615207374 | Idea Group Reference, May 30, 2010, cover price $180.00 | About this edition: Over the past few decades, there has been numerous research studies conducted involving the synchronization of dynamical systems with several theoretical studies and laboratory experimentations demonstrating the pivotal role for this phenomenon in secure communications.
Product Description: This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications. It focuses on tailoring the security solution to the underlying network architecture (such as the wireless cellular network or the ad hoc/sensor network), or to the application using the security methods (such as multimedia multicasts)...read more
Hardcover:
9780387688466 | Springer Verlag, October 12, 2007, cover price $139.00 | About this edition: This book aims to fill a growing need in the research community for a reference that describes the state-of-the-art in securing group communications.
displaying 1 to 8 |
at end