|
|
|
|
| | Secure Communicating Systems: Design, Analysis, and ImplementationThis volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical... | | Information ScienceFrom cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains... |
|
Disaster Recovery (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... | | XML Web Services in the OrganizationDiscover how you can use XML-based Web services to dramatically improve the data sharing and communication capabilities in your organization. This pragmatic guide teaches you how to exploit the interoperability features of the Microsoft .NET Framework to build highly available, platform-independent Web services. Easy-to-follow sample... |
|
|
|
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 |