|
|
|
|
|
Cryptography and Network Security (4th Edition)In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.
As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey... | | Encyclopedia of Cryptography and SecurityThis comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this... | | Security+Fast PassThe Perfect Preparation and Review Resource Security+ Fast Pass is the streamlined tool you need to bone up for the Security+ exam [SYO-101]. The enclosed CD lets you practice, practice, practice, and you’ll keep the book—packed with concise, objective-focused coverage and... |
|
Cryptographic Boolean Functions and ApplicationsBoolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).
Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean... | | | | CompTIA Security+ Deluxe Study GuideCompTIA Security+ Deluxe Study Guide gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and insights drawn from real-world experience and review your newly acquired knowledge with cutting-edge exam preparation software, including a test... |
|
Learning Perl, 5th EditionLearning Perl is designed for those who seek a rapid working knowledge of Perl. A public domain language, Perl has established itself as the premier UNIX scripting language--replacing facilities such as the shell, sed and awk. It is currently taking root in non-UNIX markets as well. Perl is a high-level, multi-purpose language. It is used in... | | Cryptography: Cracking Codes (Intelligence and Counterintelligence)
While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryptionessentially the need to code information... | | Mission Critical Internet SecurityThe best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This... |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |