Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction …
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, …
The Joy of Cryptography is an undergraduate textbook in cryptography. This book grew out of lecture notes I developed for …
The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible …
Discover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help …
This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It …
Key FeaturesGet to grips with the underlying technical principles and implementations of blockchain.Build powerful applications using Ethereum to secure transactions …
A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it …
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key …
The Belgian block cipher Rijndael was chosen in 2000 by the U.S. governments National Institute of Standards and Technology (NIST) …
This book constítutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held …
The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) …
This book, by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail …
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace …
This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the …
India, Pakistan and the Secret Jihad explores the history of jihadist violence in Kashmir, and argues that the violent conflict …
Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for …
Will your organization be protected the day a quantum computer breaks encryption on the internet?Computer encryption is vital for protecting …
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, …
This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques …
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as …
The Metasploit framework has been around for a number of years and is one of the most widely used tools …
With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. …
Discover the next level of network defense and penetration testing with the Metasploit 5.0 frameworkKey FeaturesMake your network robust and …
This book demystifies the amazing architecture and protocols of computers as they communicate over the Internet. While very complex, the …
Deliver fast, reliable, and maintainable applications by building backend servers, services, and frontends all in nothing but Rust. In Rust …
Pro Apache Tomcat 6 is ideal for Tomcat administrators and others who want to configure Tomcat. It covers only Tomcat …
This work is licensed under the Creative Common Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license.
Learn to design, implement and secure your IoT infrastructure Key Features • Build a complete IoT system that is the …
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as …
"Hacking the Xbox" is a fascinating book about exactly what it says. If you have no interest in gory details …
Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production …
Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) …
Intermediate user level
Automate core security tasks by embedding security controls and processes early in the DevOps workflow through DevSecOps. You will not …