Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer …
This book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical …
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction …
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, …
The Joy of Cryptography is an undergraduate textbook in cryptography. This book grew out of lecture notes I developed for …
The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible …
Discover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help …
This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It …
Key FeaturesGet to grips with the underlying technical principles and implementations of blockchain.Build powerful applications using Ethereum to secure transactions …
A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it …
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key …
The Belgian block cipher Rijndael was chosen in 2000 by the U.S. governments National Institute of Standards and Technology (NIST) …
This book constítutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held …
The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) …
This book, by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail …
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace …
This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the …
India, Pakistan and the Secret Jihad explores the history of jihadist violence in Kashmir, and argues that the violent conflict …
Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for …
Will your organization be protected the day a quantum computer breaks encryption on the internet?Computer encryption is vital for protecting …
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, …
This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques …
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as …
The Metasploit framework has been around for a number of years and is one of the most widely used tools …
With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. …
Discover the next level of network defense and penetration testing with the Metasploit 5.0 frameworkKey FeaturesMake your network robust and …
This book demystifies the amazing architecture and protocols of computers as they communicate over the Internet. While very complex, the …
Deliver fast, reliable, and maintainable applications by building backend servers, services, and frontends all in nothing but Rust. In Rust …
Pro Apache Tomcat 6 is ideal for Tomcat administrators and others who want to configure Tomcat. It covers only Tomcat …
This work is licensed under the Creative Common Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) license.
Learn to design, implement and secure your IoT infrastructure Key Features • Build a complete IoT system that is the …
Dive into SQL Server 2019 administration–and really put your SQL Server DBA expertise to work. This supremely organized reference packs …
Your one-step guide to understanding industrial cybersecurity and its control systems and operationsKey FeaturesLearn about endpoint protection-implement anti-malware and update, …
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they …
Secure your ICS and SCADA systems the battle-tested Hacking Exposed™ way This hands-on guide exposes the devious methods cyber threat …