 |
|
|
|
 Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in... |  |  Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Mastering Bitcoin is essential reading for everyone interested in learning about bitcoin basics, the technical operation of bitcoin, or if you're building the next great bitcoin killer app or business. From using a bitcoin wallet to buy a cup of coffee, to running a bitcoin marketplace with hundreds of thousands of transactions, or... |  |  Sun Certified Security Administrator for Solaris 9 & 10 Study GuideGet the book that shows you not only what--but how--to study
- Complete coverage of all official exam objectives
- Exam Readiness checklist at the front of the book--you’re ready for the exams when all objectives on the list are checked off
- Real-world exercises--Step-by-step instruction...
|
|
 Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown... |  |  Beginning Cryptography with JavaBeginning Cryptography with Java
While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.
This book teaches you how. Chapters one through... |  |  Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who... |
|
|
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 |