



Certified Ethical Hacker (CEH) Foundation Guide
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...   Blockchain Basics: A NonTechnical Introduction in 25 Steps
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.
This book...   

Making, Breaking Codes: Introduction to Cryptology
This book is an introduction to modern ideas in cryptology and how to employ
these ideas. It includes the relevant material on number theory, probability, and
abstract algebra, in addition to descriptions of ideas about algorithms and com
plexity theory. Three somewhat different terms appear in the discussion of secure
communications...   Cryptography for DummiesProtect yourself and your business from online eavesdroppers—it’s easier than you think! If you were hoping for a flamethrowing watch or flying a car, we’re sorry—this isn’t James Bond’s equipment manual. Cryptography is a commonsense way to secure stuff on the Internet, and this friendly guidebook makes...   Cryptography in C and C++, Second EditionThis book covers all that is needed to write professionallevel cryptographic code. An expanded and improved version of the very well received first edition, it includes approximately 100 pages of new material as well as numerous improvements in the original text.
Text focusing on the practical aspects of cryptography in C and C++, ... 

Post Quantum CryptographyQuantum computers will break today's most popular publickey cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantumcomputer attacks: in particular, postquantum publickey encryption systems and postquantum publickey signature...     



Result Page: 29 28 27 26 25 24 23 22 21 20 