Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most
notably in communications between users, servers, and devices. Unfortunately,
this has led to many security challenges and problems. Recent examples include
password leakage on large social network sites and defacement of websites. It is,
Network Security Essentials: Applications and Standards (4th Edition)
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections...
Cryptography in C and C++, Second Edition
This book covers all that is needed to write professional-level cryptographic code. An expanded and improved version of the very well received first edition, it includes approximately 100 pages of new material as well as numerous improvements in the original text.
Text focusing on the practical aspects of cryptography in C and C++,...
Cryptography: A Very Short Introduction
We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.
In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...
|Result Page: 32 31 30 29 28 27 26 25 24 23 |