Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Algorithms Unlocked
Algorithms Unlocked

Have you ever wondered how your GPS can find the fastest way to your destination, selecting one route from seemingly countless possibilities in mere seconds? How your credit card account number is protected when you make a purchase over the Internet? The answer is algorithms. And how do these mathematical formulations translate themselves...

Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised ... (Lecture Notes in Computer Science, 10958)
Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised ... (Lecture Notes in Computer Science, 10958)
This book constitutes the refereed proceedings of 3 workshops held at the 22nd International Conference on Financial Cryptography and Data Security, FC 2018, in Nieuwport, Curaçao, in March 2018.

The 23 full papers presented together with 2 short papers were carefully reviewed and selected
...
A Classical Introduction to Cryptography: Applications for Communications Security
A Classical Introduction to Cryptography: Applications for Communications Security
From the reviews:

"This impressive hardback introduces fundamentals of information and communications security by providing mathematical concepts to prove or break the security of cryptographic schemes. … The book is designed for upper-level undergraduates and graduate level students in computer science. This comprehensive volume is...

Secure Programming Cookbook for C and C++ : Recipes for Cryptography, Authentication, Input Validation & More
Secure Programming Cookbook for C and C++ : Recipes for Cryptography, Authentication, Input Validation & More
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation,...
Designing Network Security
Designing Network Security

A practical guide to creating a secure network infrastructure

* Understand basic cryptography and security technologies
* Identify the threats and common attacks to a network infrastructure
* Learn how to create a security policy
* Find out how to recover from a security breach
* Study specific implementation
...

Finite Automata and Application to Cryptography
Finite Automata and Application to Cryptography
Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed.

Finite automata are...

The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Wireless Network Administration A Beginner's Guide
Wireless Network Administration A Beginner's Guide

Learn the essentials of wireless networking

Configure, manage, and secure wireless networks using the step-by-step details in this practical resource. Wireless Network Administration: A Beginner's Guide shows you how to work with the latest wireless networking standards, including the 802.11x family, on Windows, Mac,...

Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy