The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, …
Two renowned investment advisors and authors of the bestseller The Great Reckoning bring to light both currents of disaster and …
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer …
Basic Concepts in Information Theory and Coding is an outgrowth of a one semester introductory course that has been taught …
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography―the science of sending secret messages. …
Wiliiam Stallings' Network Security: Applications and Standards, 4/e is a practical survey of network security applications and standards, with unmatched …
This book serves as a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards -- and …
History’s Ingenious Covert Communications and Secret Symbols All civilizations have used code to hide their texts from unwelcome eyes or …
Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the …
A no-holds-barred examination of the National Security Agency packed with startling secrets about its past, newsbreaking revelations about its present-day …
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its …