With the arrival of IEEE 802.11b (a.k.a. WiFi) and other wireless networking technologies on the market comes a wave of …
* Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology * …
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced …
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography―the science of sending secret messages. …
Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting …
Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the …
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its …
A highly experienced computer book author and expert in the area of security and communications provides experienced programmers with a …
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic …
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. …
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect …
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in …
An accessible introduction to cybersecurity concepts and practicesCybersecurity Essentialsprovides a comprehensive introduction to the field, with expert coverage of essential …
William Stallings Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with …
Cryptography and Network Security For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is …
Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network …
Cryptography is an outstanding book that covers all the major areas of cryptography in a readable, mathematically precise form. Several …
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, …
Proceedings of the 4th Intl Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, held February 12-14, 2002 …
This book constitutes the refereed proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, PKC …
This book constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, PKC …
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, …
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what …
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction …
The Joy of Cryptography is an undergraduate textbook in cryptography. This book grew out of lecture notes I developed for …
The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible …
This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It …
It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most …
Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of …
This book constítutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held …
The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) …
This book, by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail …
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace …
This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the …
In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many …