Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Authentication and Access Control: Practical Cryptography Methods and Tools

Buy
The advent of the Internet has allowed for many services and applications, most notably in communications between users, servers, and devices. Unfortunately, this has led to many security challenges and problems. Recent examples include password leakage on large social network sites and defacement of websites. It is, therefore, necessary to study mechanisms that help reduce the risks of different types of attacks. One of those mechanisms is access control, which applies the processes of cryptography, authentication, and key establishment. Thus, this book is written with an attempt to provide a comprehensive coverage on the subject of authentication mechanisms. The book is intended for anyone wishing to understand the basic principles of cryptography and why they form an important part of authentication mechanisms. In addition, it provides readers with theories and examples of existing authentication technologies, which the author hopes will be useful and adaptable in practice. However, this book is not a manual for network or system configurations. Authentication and Access Control: Practical Cryptography Methods and Tools can be used in many ways. It can be used as a self-study reference. It can also be used as a supplementary textbook for computer network security and information security courses.
(HTML tags aren't allowed.)

WebGL Programming Guide: Interactive 3D Graphics Programming with WebGL (OpenGL)
WebGL Programming Guide: Interactive 3D Graphics Programming with WebGL (OpenGL)

Using WebGL®, you can create sophisticated interactive 3D graphics inside web browsers, without plug-ins. WebGL makes it possible to build a new generation of 3D web games, user interfaces, and information visualization solutions that will run on any standard web browser, and on PCs, smartphones, tablets, game...

Supervised and Unsupervised Pattern Recognition: Feature Extraction and Computational Intelligence
Supervised and Unsupervised Pattern Recognition: Feature Extraction and Computational Intelligence

There are many books on neural networks, some of which cover computational intelligence, but none that incorporate both feature extraction and computational intelligence, as Supervised and Unsupervised Pattern Recognition does. This volume describes the application of a novel, unsupervised pattern recognition scheme to the classification of...

Active Directory, Second Edition
Active Directory, Second Edition
Active Directory, 2nd Edition, provides system and network administrators, IT professionals, technical project managers, and programmers with a clear, detailed look at Active Directory for both Windows 2000 and Windows Server 2003. Active Directory, 2nd Edition will guide you through...

Inside the Java Virtual Machine (Java Masters Series)
Inside the Java Virtual Machine (Java Masters Series)
Want to write better Java programs? Look under the hood and see what makes the ingenious Java engine run! This easy-to-understand yet technically rich description of the Java Virtual Machine (JVM)--the engine of the Java language--is your key to writing more efficient and effective Java code. It provides a complete JVM tutorial and desktop...
Fuzzy Logic and the Semantic Web (Capturing Intelligence)
Fuzzy Logic and the Semantic Web (Capturing Intelligence)
It is with great delight that I write the preface for this, the very first volume in Elsevier's new book series "Capturing Intelligence".

This series aims at publishing books on research from all disciplines dealing with and affecting the issue of understanding and reproducing intelligent artificial systems. The series will
...
Mac Application Development by Example Beginner's Guide
Mac Application Development by Example Beginner's Guide

It's never been more important to have the ability to develop an App for Mac OS X. Whether it's a System Preference, a business app that accesses information in the Cloud, or an application that uses multi-touch or uses a camera, you will have a solid foundation in app development to get the job done.

Mac Application...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy