Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Lecture Notes in Computer Science)
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of...

Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust...
Complex and Revision Shoulder Arthroplasty: An Evidence-Based Approach to Evaluation and Management
Complex and Revision Shoulder Arthroplasty: An Evidence-Based Approach to Evaluation and Management
This practical text presents the most up-to-date information on the evaluation and management of all aspects of complex and revision shoulder arthroplasty, divided into three thematic section. Chapters in part I focus on the diagnosis and management of complex primary shoulder arthroplasty, including evaluation of humeral and glenoid bone...
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary is your full reference resource for all things cryptography.

Cryptography from A5/0 to ZRTP
 
Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for
...
Cryptography: An Introduction
Cryptography: An Introduction
Nigel Smart’s Cryptography provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics. Covering the latest developments in computer cryptography, including the Rijndael algorithm chosen for the...
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

Cryptanalytic Attacks on RSA
Cryptanalytic Attacks on RSA
RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science....
XML Security
XML Security

Keep XML applications and documents secure with help from the leading authority in e-security

Get up to speed on XML and applied security technologies using this authoritative guide. Covering the fundamentals of XML structures and related security technologies--including XML signatures, XML encryption, and the XML key management...

Guide to Elliptic Curve Cryptography (Springer Professional Computing)
Guide to Elliptic Curve Cryptography (Springer Professional Computing)
The study of elliptic curves by algebraists, algebraic geometers and number theorists
dates back to the middle of the nineteenth century. There now exists an extensive literature
that describes the beautiful and elegant properties of these marvelous objects. In
1984, Hendrik Lenstra described an ingenious algorithm for factoring
...
RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Cryptography in C and C++
Cryptography in C and C++
  • Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain
  • Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++
  • Not toy code(tm), but a practical treatment of modern cryptographic...
Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy