The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, …
Two renowned investment advisors and authors of the bestseller The Great Reckoning bring to light both currents of disaster and …
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer …
Basic Concepts in Information Theory and Coding is an outgrowth of a one semester introductory course that has been taught …
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography―the science of sending secret messages. …
Wiliiam Stallings' Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched …
This book serves as a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards -- and …
History’s Ingenious Covert Communications and Secret Symbols All civilizations have used code to hide their texts from unwelcome eyes or …
Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the …
A no-holds-barred examination of the National Security Agency packed with startling secrets about its past, newsbreaking revelations about its present-day …
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its …
The Most Progressive and Complete Guide to DDO-Based Ciphers Developers have long recognized that ciphers based on Permutation Networks (PNs) …
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. …
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic …
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect …
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in …