|
|
|
|
| | | | Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most
notably in communications between users, servers, and devices. Unfortunately,
this has led to many security challenges and problems. Recent examples include
password leakage on large social network sites and defacement of websites. It is,
therefore,... |
|
Cryptography: An IntroductionNigel Smart’s Cryptography provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics. Covering the latest developments in computer cryptography, including the Rijndael algorithm chosen for the... | | Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills)Experiment with cryptography — the science of secret writing. Cipher and decipher codes: transposition and polyalphabetical ciphers, famous codes, typewriter and telephone codes, codes that use playing cards, knots, and swizzle sticks...even invisible writing and sending messages through outer space. Hours of intrigue and challenge. 45... | | Network Security BibleIf you need a solid foundation in network security, this is it
Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how... |
|
|
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |