 |
|
 |  |  Voice over IP SecurityVoice over IP Security
Security best practices derived from deep analysis of the latest VoIP network threats
Patrick Park
VoIP... |  |  Java Security (Java Series)
Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with... |
|
 Cryptography Demystified
Works through 35 cryptography modules supported by exercises and answers
This first part comprises thirteen modules. These modules will
familiarize you with some of the important terms and concepts of
cryptography in general and symmetric of one-key cryptography in specific.
Symmetric cryptography is the ... |  |  |  |  Android Application Security Essentials
Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.
Overview
-
Understand Android security from kernel to the application layer
-
Protect...
|
|
 Bitcoin for the Befuddled
Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin—the game-changing digital currency used by millions worldwide.
But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions... |  |  Security for Multihop Wireless Networks
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area... |  |  Algebraic Curves in Cryptography (Discrete Mathematics and Its Applications)
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic... |
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |