|
|
|
|
|
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.
The Program Committee,... | | C# Programmer's CookbookNext time you hit the wall with a tough C# development problem, get the code behind the solution—and solve it the right way. The C# Programmer’s Cookbook provides at-a-glance reference to hundreds of C# and Microsoft .NET Framework programming scenarios using a concise, problem/solution format. The book’s organized so... | | Digital Signatures (Advances in Information Security)
As a beginning graduate student, I recall being frustrated by a general lack of accessible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren’t there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my... |
|
| | Security+ Study Guide, 2nd Edition (SYO-101)Here's the book you need to prepare for CompTIA's Security+ exam. This updated edition of the best-selling Security+ Study Guide was developed to meet the exacting requirements of today's certification candidates and aspiring IT security professionals. In addition to the consistent and accessible instructional... | | Inside Internet Security: What Hackers Don't Want You To KnowThis book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business.... |
|
Algorithmic Cryptanalysis (Cryptography and Network Security)Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,... | | Cryptography in C and C++, Second EditionThis book covers all that is needed to write professional-level cryptographic code. An expanded and improved version of the very well received first edition, it includes approximately 100 pages of new material as well as numerous improvements in the original text.
Text focusing on the practical aspects of cryptography in C and C++, ... | | Fault Analysis in Cryptography (Information Security and Cryptography)
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic... |
|
|
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 |