This book is about cryptography as it is used in real-world systems, about cryptography as an engineering discipline rather than …
Security Smarts for the Self-Guided IT Professional “Get to know the hackers—or plan on getting hacked. Sullivan and Liu have …
Well-known security experts decipher the most challenging aspect of cloud computing-securityCloud computing allows for both large and small organizations to …
In 2011, a big corporation suffered a 23-day network outage after a breach of security that allowed the theft of …
Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level Security is a …
SQL Server is the dominant relational database in the Windows market and data security is a huge and growing concern …
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario …
This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC …
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic …
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what …
Developers tasked with security problems are often not cryptographers themselves. They are bright people who, with careful guidance, can implement …
For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security …
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key …
There are many books on data structures and algorithms, including some with useful libraries of C functions. Mastering Algorithms with …
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, …
Learn to evaluate and compare data encryption methods and attack cryptographic systemsKey FeaturesExplore popular and important cryptographic methodsCompare cryptographic modes …