Home | Amazing | Today | Tags | Publishers | Years | Search 
Applied Cryptanalysis: Breaking Ciphers in the Real World
Applied Cryptanalysis: Breaking Ciphers in the Real World
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material...
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions...

Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
Formal Refinement for Operating System Kernels
Formal Refinement for Operating System Kernels
The kernel of any operating system is its most critical component. The remainder of the system depends upon a correctly functioning and reliable kernel for its operation.

The purpose of this book is to show that the formal specification of kernels can be followed by a completely formal refinement process that leads to the extraction of...

Concurrent Zero-Knowledge: With Additional Background by Oded Goldreich
Concurrent Zero-Knowledge: With Additional Background by Oded Goldreich
Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory definition; zero-knowledge proofs are convincing and yet yield nothing beyond the validity of the assertion being proved. Their applicability in the domain of cryptography is vast.

A fundamental question...

Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics
Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics
From the reviews:

"This book presents a large number of probabilistic aspects of cryptographic systems . All the classical statistical tests on random sequences are motivated and precisely detailed here. This book is surely a valuable companion to the NIST standard reference ." (Jérémie Bourdon, Mathematical...

Next Generation Intelligent Optical Networks: From Access to Backbone
Next Generation Intelligent Optical Networks: From Access to Backbone
Optical networks have been in commercial deployment since the early 1980s as a result of advances in optical, photonic, and material technologies. Although the initial deployment was based on silica fiber with a single wavelength modulated at low data rates, it was quickly demonstrated that fiber can deliver much more bandwidth than any other...
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive...
Inferno Programming with Limbo
Inferno Programming with Limbo

Inferno Programming with Limbo is the first complete developer’s guide to programming for the Inferno operating system. Developed at Lucent's Bell Labs, Inferno enables cross-platform, portable, distributed application development that is well suited for networked applications on resource constrained, embedded systems. Limbo is its...

The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)
Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.

Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy