|
|
Introduction to 64 Bit Intel Assembly Language Programming for Linux
The Intel CPU architecture has evolved over 3 decades from a 1 6 bit
CPU with no memory protection, through a period with 32 bit processors
with sophisticated architectures into the current series of processors which
support all the old modes of operation in addition to a greatly expanded
64 bit mode of operation. Assembly... | | Voice over IP SecurityVoice over IP Security
Security best practices derived from deep analysis of the latest VoIP network threats
Patrick Park
VoIP... | | Understanding Cryptography: A Textbook for Students and PractitionersCryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a... |
|
Beautiful Security: Leading Security Experts Explain How They ThinkIn this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found... | | An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required... | | |
|
Advanced Data StructuresAdvanced Data Structures presents a comprehensive look at the ideas, analysis, and implementation details of data structures as a specialized topic in applied algorithms. Data structures are how data is stored within a computer, and how one can go about searching for data within. This text examines efficient ways to search and update sets of... | | Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, ProceedingsThe 6th Conference on Security and Cryptography for Networks (SCN 2008) was held in Amalfi, Italy, on September 10–12, 2008. The first four editions of the conference where held in Amalfi, while, two years ago, the fifth edition was held in the nearby Maiori. This year we moved back to the traditional location.
Security and privacy... | | Network Security Essentials (2nd Edition)This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of cryptography—covering algorithms and protocols... |
|
Algorithms and Data Structures: The Basic ToolboxAlgorithms are at the heart of every nontrivial computer application, and algorithmics is a modern and active area of computer science. Every computer scientist and every professional programmer should know about the basic algorithmic toolbox: structures that allow efficient organization and retrieval of data, frequently used algorithms, and basic... | | Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003SAC 2003 was the tenth in a series of annual workshops on Selected Areas in Cryptography. This marked the third time that the workshop had been held at Carleton University in Ottawa with previous workshops being held there in 1995 and 1997. The intent of the SAC workshops is to provide a relaxed atmosphere in which researchers in cryptography can... | | Ruby Pocket ReferenceAlthough Ruby is an easy language to learn, in the heat of action you may find that you can't remember the correct syntax for a conditional or the name of a method. This handy pocket reference offers brief yet clear explanations of Ruby's core components, from operators to reserved words to data structures to method syntax, highlighting those key... |
|
Result Page: 6 5 4 3 2 1 |