 |
|
|
|
|
 Getting Started with OAuth 2.0
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers ... |  |  Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in... |  |  Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Mastering Bitcoin is essential reading for everyone interested in learning about bitcoin basics, the technical operation of bitcoin, or if you're building the next great bitcoin killer app or business. From using a bitcoin wallet to buy a cup of coffee, to running a bitcoin marketplace with hundreds of thousands of transactions, or... |
|
 Sun Certified Security Administrator for Solaris 9 & 10 Study GuideGet the book that shows you not only what--but how--to study
- Complete coverage of all official exam objectives
- Exam Readiness checklist at the front of the book--you’re ready for the exams when all objectives on the list are checked off
- Real-world exercises--Step-by-step instruction...
|  |  Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown... |  |  Beginning Cryptography with JavaBeginning Cryptography with Java
While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.
This book teaches you how. Chapters one through... |
|
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 |