Home | Amazing | Today | Tags | Publishers | Years | Account | Search
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust...
The Cryptoclub: Using Mathematics to Make and Break Secret Codes
Join the Cryptokids as they apply basic mathematics to make and break secret codes. This book has many hands-on activities that have been tested in both classrooms and informal settings. Classic coding methods are discussed, such as Caesar, substitution, VigenÃ¨re, and multiplicative ciphers as well as the modern RSA. Math topics covered...
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Learn to evaluate and compare data encryption methods and attack cryptographic systems

#### Key Features

• Explore popular and important cryptographic methods
• Compare cryptographic modes and understand their limitations
• Learn to perform attacks on cryptographic...
 Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security) This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many... Applied Cryptanalysis: Breaking Ciphers in the Real WorldThe book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material... Internet Security: Cryptographic Principles, Algorithms and ProtocolsCryptography is the key to securing the Internet If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important...
 Stealing the Network: How to Own an IdentityThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the... Virtualization with Microsoft Virtual Server 2005A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of... Wireless SecurityGet full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
 CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)All-in-One is All You Need Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains... Monitoring with Ganglia In 1999, I packed everything I owned into my car for a cross-country trip to begin my new job as Staff Researcher at the University of California, Berkeley Computer Science Department. It was an optimistic time in my life and the country in general. The economy was well into the dot-com boom and still a few years... Cryptography in C and C++ Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++ Not toy code(tm), but a practical treatment of modern cryptographic...
Result Page: 5 4 3 2 1