|
|
|
|
Information Security and Cryptology: 5th International Conference, Inscrypt 2009
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are... | | Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
Sometimes you have to do good engineering to straighten out twisted politics. The Electronic Frontier Foundation, a nonprofit organization that was founded to ensure that the principles embodied in the Constitution and Bill of Rights are protected as new communications technologies emerge, and O"Reilly, the premier publisher of computer... | | Wireless Security: Models, Threats, and SolutionsREAL-WORLD WIRELESS SECURITY
This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to... |
|
Algorithm-Architecture Matching for Signal and Image Processing
Advances in signal and image processing together with increasing computing power
are bringing mobile technology closer to applications in a variety of domains like
automotive, health, telecommunication, multimedia, entertainment and many others.
The development of these leading applications, involving a large diversity of
algorithms... | | CISSP All-in-One Exam Guide, 6th Edition
A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris
Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by... | | Foundations of Cryptography: Volume 1, Basic Tools (Vol 1)
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical... |
|
|
The Craft of System Security"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how... | | Advanced Statistical Steganalysis (Information Security and Cryptography)
Steganography and steganalysis, the hiding and detection of a covert payload
within an innocent cover object, started to receive attention from the computer
science, engineering, and mathematics communities in the 1990s. At
first the problems were not clearly defined, but proper statistical foundations
were proposed and mathematical... | | Random Curves: Journeys of a MathematicianThese autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital signature, cover many topics besides his own personal career in mathematics and cryptography - travels to the Soviet Union, Latin America, Vietnam and elsewhere, political activism, and academic controversies relating to math... |
|
|
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 |