• Ebook Codes - The Guide to Secrecy From Ancient to Modern Times

    Ebook Codes - The Guide to Secrecy From Ancient to Modern Times

    This book has been written with a broad spectrum of readers in mind, which includes anyone interested in secrecy and related issues. Thus, this is a tome for the merely curious, as well as history-minded readers, amateur mathematicians, engineers, bankers, academics, students, those practitioners working in cryptography, specialists in the field, and instructors wanting to use the book for a text in a course on a variety of topics related to...

     700 p actvn 27/02/2022 84 2

  • Ebook Understanding cryptography: A Textbook for Students and Practitioners

    Ebook Understanding cryptography: A Textbook for Students and Practitioners

    This book provides the reader with a deep understanding of how modern cryptographic schemes work. We introduce the necessary mathematical concepts in away that is accessible for every reader with a minimum background in college-level calculus. It is thus equally well suited as a textbook for undergraduate or beginning graduate classes, or as a reference book for practicing engineers and computerscientists who are interested in a solid...

     382 p actvn 27/02/2022 81 1

  • Ebook Information security and cryptography texts and monographs

    Ebook Information security and cryptography texts and monographs

    "Ebook Information security and cryptography texts and monographs" present symmetric-key encryption, public-key cryptography, cryptographic protocols, probabilistic algorithms, one-way functions and the basic assumptions, bit security of one-way functions, one-way functions and pseudorandomness, provably secure encryption...

     372 p actvn 30/09/2021 168 0

  • Ebook Data-Driven Block ciphers for fast telecommunication systems

    Ebook Data-Driven Block ciphers for fast telecommunication systems

    Data-Driven Block ciphers for fast telecommunication systems. Among different directions of applied cryptography, the cipher design based on the data-driven operations (DDOs) is, by comparison, poorly represented in the published and available literature.

     210 p actvn 30/09/2021 162 0

  • Ebook Information security management handbook (6th edition, volume 2) – Harold F. Tipton, Micki Krause

    Ebook Information security management handbook (6th edition, volume 2) – Harold F. Tipton, Micki Krause

    A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals...

     458 p actvn 26/09/2018 442 3

  • Ebook Network and system security - John R. Vacca

    Ebook Network and system security - John R. Vacca

    "Network and system security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux...

     405 p actvn 31/08/2017 412 24

  • Ebook Network Security Essentials: Applications and Standards (4th Edition) - William Stallings

    Ebook Network Security Essentials: Applications and Standards (4th Edition) - William Stallings

    Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition.

     432 p actvn 31/08/2017 373 9

  • Ebook Information Security Fundamentals - Thomas R. Peltier

    Ebook Information Security Fundamentals - Thomas R. Peltier

    The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective...

     262 p actvn 24/08/2015 411 12

  • Ebook Information Security Basics

    Ebook Information Security Basics

    Information security does not guarantee the safety of your organization or your information or your computer systems. Information security cannot, in and of itself, provide protection for your information. That being said, information security is also not a black art. There is no sorcery to implementing proper information security and the concepts that are included in information security are not rocket science. In many ways, information...

     413 p actvn 24/08/2015 440 9

  • Ebook Computer crime, investigation, and the law

    Ebook Computer crime, investigation, and the law

    Ebook Computer crime, investigation, and the law including content: Computer Crime, Computer Forensics, Ligation, Computer Crime and Individuals, Techniques.

     514 p actvn 18/11/2014 377 1

Hướng dẫn khai thác thư viện số