Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Cryptography (Undergraduate Texts in Mathematics)
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Java in a Nutshell, Fourth Edition
Java in a Nutshell, Fourth Edition

Java just keeps growing, adding features, functionality, complexity, and tempting developers to growl with frustration. The new 1.4 release of Java 2 Standard edition increases the size of the platform by 50%, to 2757 classes in 135 packages. How are you going to figure out what this means for your applications? As always, Java in...

Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)

You've just gotta love Ubuntu; it's an irresistible package of usability, security, and support features. But a power user like you is just itching to teach it some new tricks. Show it how to play nicely with other systems. Develop its multitasking and communication skills. Free its inner video and graphics talents. And make sure that when it...

Network Security Technologies, Second Edition
Network Security Technologies, Second Edition

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security...

Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
"He has written an excellent book that belongs in your personal library." Cryptologia

"Churchhouse (emer., Cardiff Univ., Wales) offers a history and explanation of codes, ciphers, cryptography, and cryptanalysis from Julius Caesar and WWII code-breaking activities to the present day including the world of the Internet.
...
CompTIA Security+ Review Guide: Exam SY0-401
CompTIA Security+ Review Guide: Exam SY0-401

Focused review for the CompTIA Security+ certification exam

The CompTIA Security+ certification offers tremendous opportunities for IT professionals. For those who want to take their careers to the next level, CompTIA Security+ Review Guide: Exam SY0-401 is here to serve as a great resource for certification...

Algebraic Geometry in Coding Theory and Cryptography
Algebraic Geometry in Coding Theory and Cryptography

Algebraic geometry has found fascinating applications to coding theory and cryptography in the last few decades. This book aims to provide the necessary theoretical background for reading the contemporary literature on these applications. An aspect that we emphasize, as it is very useful for the applications, is the interplay between...

Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity

Become an Ethereum Blockchain developer using a blend of concepts and hands-on implementations

Key Features

  • Understand the Ethereum Ecosystem and its differences from its rich cousin Bitcoin
  • Explore the Solidity programming language and smart contract optimizations
  • ...
The New School of Information Security
The New School of Information Security
“It is about time that a book like The New School came along. The age of security as pure technology is long past, and modern practitioners need to understand the social and cognitive aspects of security if they are to be successful. Shostack and Stewart teach readers exactly what they need to know--I just wish I could...
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...

Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Quantum Computing for Everyone (The MIT Press)
Quantum Computing for Everyone (The MIT Press)

An accessible introduction to an exciting new area in computation, explaining such topics as qubits, entanglement, and quantum teleportation for the general reader.

Quantum computing is a beautiful fusion of quantum physics and computer science, incorporating some of the most stunning ideas from twentieth-century...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy