With the arrival of IEEE 802.11b (a.k.a. WiFi) and other wireless networking technologies on the market comes a wave of …
* Provides a step-by-step approach for planning and implementing a wireless LAN based on 802.11 Wireless Fidelity (Wi-Fi) technology * …
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced …
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography―the science of sending secret messages. …
Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting …
Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the …
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its …
A highly experienced computer book author and expert in the area of security and communications provides experienced programmers with a …
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic …
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. …
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect …
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in …