• Ebook Codes - The Guide to Secrecy From Ancient to Modern Times

    Ebook Codes - The Guide to Secrecy From Ancient to Modern Times

    This book has been written with a broad spectrum of readers in mind, which includes anyone interested in secrecy and related issues. Thus, this is a tome for the merely curious, as well as history-minded readers, amateur mathematicians, engineers, bankers, academics, students, those practitioners working in cryptography, specialists in the field, and instructors wanting to use the book for a text in a course on a variety of topics related to...

     700 p actvn 27/02/2022 91 2

  • Ebook Understanding cryptography: A Textbook for Students and Practitioners

    Ebook Understanding cryptography: A Textbook for Students and Practitioners

    This book provides the reader with a deep understanding of how modern cryptographic schemes work. We introduce the necessary mathematical concepts in away that is accessible for every reader with a minimum background in college-level calculus. It is thus equally well suited as a textbook for undergraduate or beginning graduate classes, or as a reference book for practicing engineers and computerscientists who are interested in a solid...

     382 p actvn 27/02/2022 82 1

  • Ebook Information security and cryptography texts and monographs

    Ebook Information security and cryptography texts and monographs

    "Ebook Information security and cryptography texts and monographs" present symmetric-key encryption, public-key cryptography, cryptographic protocols, probabilistic algorithms, one-way functions and the basic assumptions, bit security of one-way functions, one-way functions and pseudorandomness, provably secure encryption...

     372 p actvn 30/09/2021 171 0

  • Ebook Data-Driven Block ciphers for fast telecommunication systems

    Ebook Data-Driven Block ciphers for fast telecommunication systems

    Data-Driven Block ciphers for fast telecommunication systems. Among different directions of applied cryptography, the cipher design based on the data-driven operations (DDOs) is, by comparison, poorly represented in the published and available literature.

     210 p actvn 30/09/2021 163 0

  • Ebook Information security management handbook (6th edition, volume 2) – Harold F. Tipton, Micki Krause

    Ebook Information security management handbook (6th edition, volume 2) – Harold F. Tipton, Micki Krause

    A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals...

     458 p actvn 26/09/2018 442 3

  • Ebook Modern Cryptography - Theory and Practice: Phần 1

    Ebook Modern Cryptography - Theory and Practice: Phần 1

    Part 1 books Pc Underground give readers the knowledge overview: beginning with a simple communication game, wrestling between safeguard and attack, probability and information theory, computational complexity, algebraic foundations,... Invite you to consult.

     387 p actvn 28/02/2018 439 1

  • Ebook Modern Cryptography - Theory and Practice: Phần 2

    Ebook Modern Cryptography - Theory and Practice: Phần 2

    Part 1 of the book serial ebook Pc Underground to part 2 of you will continue to learn about relevant issues such as: authentication protocols — principles, authentication protocols — the real world, authentication framework for public-key cryptography, formal and strong security definitions for public-key cryptosystems,... Document serve you specialized information technology and related industries.

     368 p actvn 28/02/2018 443 1

  • Ebook Network and system security - John R. Vacca

    Ebook Network and system security - John R. Vacca

    "Network and system security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux...

     405 p actvn 31/08/2017 413 24

  • Ebook Network Security Essentials: Applications and Standards (4th Edition) - William Stallings

    Ebook Network Security Essentials: Applications and Standards (4th Edition) - William Stallings

    Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition.

     432 p actvn 31/08/2017 374 9

  • Ebook Cryptography and network security: principles and practice (5th edition): Part 1

    Ebook Cryptography and network security: principles and practice (5th edition): Part 1

    William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security....

     511 p actvn 31/08/2017 445 17

  • Ebook Cryptography and network security: principles and practice (5th edition): Part 2

    Ebook Cryptography and network security: principles and practice (5th edition): Part 2

    In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. The book is divided into 2 parts, part 2 from chapter 16 to chapter 23.

     389 p actvn 31/08/2017 395 12

  • Ebook Lý thuyết thông tin và mã hóa: Phần 1

    Ebook Lý thuyết thông tin và mã hóa: Phần 1

    Phần 1 cuốn sách "Lý thuyết thông tin và mã hóa" cũng cáo cho người đọc các nội dung: Mở đầu về lý thuyết thông tin và mã hóa, lượng tin và en-tro-py, nguồn rời rạc và kênh rời rạc, mã hóa nguồn rời rạc, mã hóa kênh rời rạc. Mời các bạn cùng tham khảo nội dung chi tiết.

     148 p actvn 23/11/2015 436 19

Hướng dẫn khai thác thư viện số