Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The telegraph, telephone, radio, and especially the computer have put everyone on the globe within earshot— at the price of our privacy. It may feel like we're performing an intimate act when, sequestered in our rooms and cubicles, we casually use our cell phones and computers to transmit our thoughts, confidences,...

Cellular Automata: 7th International Conference on Cellular Automata for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006,   Proceedings
Cellular Automata: 7th International Conference on Cellular Automata for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006, Proceedings
This book constitutes the refereed proceedings of the 7th International Conference on Cellular Automata for Research and Industry, ACRI 2006, held in Perpignan, France in September 2006.

The 53 revised full papers and 19 revised poster papers presented together with 6 invited lectures were carefully reviewed and selected from around 100...

Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to...
Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
The Blockchain Developer: A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects
The Blockchain Developer: A Practical Guide for Designing, Implementing, Publishing, Testing, and Securing Distributed Blockchain-based Projects

Become a Blockchain developer and design, build, publish, test, maintain and secure scalable decentralized Blockchain projects using Bitcoin, Ethereum, NEO, EOS and Hyperledger.  

This book helps you understand Blockchain beyond development and crypto to better harness its power and capability. You will learn...

Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004
Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004
This book constГ­tutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held in Bonn, Germany in May 2004. The 10 revised full papers presented together with an introductory survey and 4 invited papers by leading researchers were carefully selected during two rounds of...
Blockchain: Blueprint for a New Economy
Blockchain: Blueprint for a New Economy

Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth...

Advances in Cryptology - Crypto 2004: 24th Annual International Cryptology Conference, Santa Barbara, California
Advances in Cryptology - Crypto 2004: 24th Annual International Cryptology Conference, Santa Barbara, California
Crypto 2004, the 24th Annual Crypto Conference, was sponsored by the International
Association for Cryptologic Research (IACR) in cooperation with the
IEEE Computer Society Technical Committee on Security and Privacy and the
Computer Science Department of the University of California at Santa Barbara.

The program committee
...
Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007
Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007
This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.

The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical...

Applied Cryptanalysis: Breaking Ciphers in the Real World
Applied Cryptanalysis: Breaking Ciphers in the Real World
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material...
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary is your full reference resource for all things cryptography.

Cryptography from A5/0 to ZRTP
 
Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for
...
unlimited object storage image
Result Page: 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy