To see the other types of publications on this topic, follow the link: Data encryption.

Books on the topic 'Data encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Data encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

National Bureau of Standards. Data encryption standard. Gaithersburg, MD: U.S. Dept. of Commerce, National Bureau of Standards, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer Systems Laboratory (U.S.), ed. Data Encryption Standard (DES). Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Blinn, Eric. SQL Server Transparent Data Encryption. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Held, Gilbert. Top secret data encryption techniques. Carmel, Ind: Sams Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

International Business Machines Corporation. International Technical Support Organization, ed. IBM System Storage Data Encryption. Poughkeepsie, NY: IBM, International Technical Support Organization, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Boston, MA: Springer Science+Business Media, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

inc, International Resource Development, ed. Data, text & voice encryption worldwide markets. Norwalk, Conn., U.S.A. (6 Prowitt St., Norwalk 06855): International Resource Development, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

inc, International Resource Development, ed. Data, fax & voice encryption equipment, worldwide. New Canaan, Conn: International Resource Development, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Library of Congress. Congressional Research Service., ed. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Smith, Marcia S. Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. New York, NY: Springer New York, 1993. http://dx.doi.org/10.1007/978-1-4613-9314-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Biham, Eli. Differential cryptanalysis of the data encryption standard. New York: Springer-Verlag, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tan, Woei-Wen. Hardware/software codesign of data encryption algorithms. Manchester: UMIST, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Mulder, Valentin, Alain Mermoud, Vincent Lenders, and Bernhard Tellenbach, eds. Trends in Data Protection and Encryption Technologies. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lian, Shiguo. Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Thomas, Friedlob G., and Institute of Internal Auditors, eds. An auditor's guide to encryption. Altamonte Springs, Fla: The Institute of Internal Auditors, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Xu, Zhengquan. Video encryption technology and application. Hauppauge, N.Y: Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Xu, Zhengquan. Video encryption technology and application. New York: Nova Science Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

K, Kokula Krishna Hari, ed. Enhancing Security in Dynamic Public Cloud Data Using Encryption. Chennai, India: Association of Scientists, Developers and Faculties, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Lek, Kamol. Cryptography: Protocols, design, and applications. Hauppauge, N.Y: Nova Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Information Technology Laboratory (National Institute of Standards and Technology). Announcing the Advanced Encryption Standard (AES). Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Johannes, Buchmann, and Ding Jintai, eds. Post-quantum cryptography: Second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 proceedings. Berlin: Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Evangelos, Kranakis, and Van Oorschot Paul C, eds. Selected areas in cryptography. Boston: Kluwer Academic, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Tamura, Shinsuke. Anonymous security systems and applications: Requirements and solutions. Hershey, PA: Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Stavroulakis, Peter, and Mark Stamp. Handbook of information and communication security. Heidelberg: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wu, Min. Multimedia Data Hiding. New York, NY: Springer New York, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

United States. Securities and Exchange Commission. Office of Audits. Evaluation of the SEC encryption program. Washington, D.C: U.S. Securities and Exchange Commission, Office of Inspector General, Office of Audits, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

National Institute of Standards and Technology (U.S.), ed. Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Bootyman, David. Data encryption. Bradford, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Staff, Cisco Learning Institute. Encryption. Pearson Education, Limited, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Simple Steps to Data Encryption:. Elsevier, 2013. http://dx.doi.org/10.1016/c2012-0-06008-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Tanougast, Camel. Progress in Data Encryption Research. Nova Science Publishers, Incorporated, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Data breach and encryption handbook. Chicago: American Bar Association, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Simple Steps to Data Encryption. Syngress Media,U.S., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Gupta, Brij, and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Gupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Gupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Gupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Gupta, Brij B., and Mamta. Secure Searchable Encryption and Data Management. Taylor & Francis Group, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Verma, Mr Shambhulal. Secure Data Communication: Using XML Encryption. CreateSpace Independent Publishing Platform, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Data Integrity: How Public Key Encryption Ensures Data Integrity. Independently Published, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Satellite Encryption. Academic Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Kiayias, Aggelos, and Serdar Pehlivanoglu. Encryption for Digital Content. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Encryption technology: Congressional issues. [Washington, D.C.]: Congressional Research Service, Library of Congress, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lian, Shiguo. Multimedia Content Encryption: Techniques and Applications. Taylor & Francis Group, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Data, text and voice encryption worldwide markets. New Canaan, Conn., U.S.A. (21 Locust Ave., New Canaan 06840): International Resource Development, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Curtin, Matt. Brute Force: Cracking the Data Encryption Standard. Springer London, Limited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Biham, Eli, and Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography