 |
|
 |  |  Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.
The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical... |  |  Cryptology UnlockedCryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.
This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic... |
|
|
 |  |  Applied Cryptanalysis: Breaking Ciphers in the Real WorldThe book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material... |  |  Modern Cryptography: Theory and PracticeLeading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents... |
|
 |  |  Crypto Anarchy, Cyberstates, and Pirate UtopiasIn Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence... |  |  Java in a Nutshell : A Desktop Quick Reference (Java Series) (3rd Edition)The 3rd edition of the well-known reference, Java in a Nutshell, covers the essential APIs of Java 1.2, including networking, security, input and output, and basic language and utility classes. Due to the size of the Java 1.2 API, graphics and graphical user interface classes are now examined in a volume called Java Foundation Classes... |
|
| Result Page: 2 1 |