Post Quantum Cryptography Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book...
Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...
Digital Security: Cyber Terror and Cyber Security
These days, it is not unusual for 10- to 12-year-olds to be pub-
lishing their own Web sites or for second and third graders to
begin computer classes. At the same time, computer games are
becoming increasingly popular as major publishing houses continue
to churn out educational computer programs for children in pre-
|Result Page: 18 17 16 15 14 13 12 11 10 9 |