Login: Password:  Do not remember me

Categories




Video TrainingCryptography Network Security (McGraw-Hill Forouzan Networking)



Cryptography Network Security (McGraw-Hill Forouzan Networking)

Cryptography Network Security (McGraw-Hill Forouzan Networking) pdf
English | Size: 48.98 MB
Category: Security

A textbook for beginners in security. In this new first edition, well-known author Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security.

      Read more...         

E-BooksFull Stack Python Security Cryptography, TLS, and attack resistance




Full Stack Python Security Cryptography, TLS, and attack resistance
English | 2021 | ISBN: 1617298824 | 502 pages | EPUB | 6.34 MB
Full Stack Python Security teaches you everything you'll need to build secure Python web applications.
Summary



      Read more...         

E-BooksModern Cryptography for Cybersecurity Professionals Learn how you can leverage encryption





Modern Cryptography for Cybersecurity Professionals Learn how you can leverage encryption
Modern Cryptography for Cybersecurity Professionals:
Learn how you can leverage encryption to better secure your organization's data

English | 2021 | ISBN: 1838644350 | 286 Pages | PDF EPUB MOBI | 29 MB



      Read more...         

E-BooksFoundations of Cryptography A Primer




Foundations of Cryptography A Primer


Foundations of Cryptography A Primer
pdf | 1.94 MB | English | Isbn:‎ B00GSI34S8 | Author: Czesław Kościelny | Year: 2013





      Read more...         

E-BooksCRC Press Handbook Of Applied Cryptography




CRC Press Handbook Of Applied Cryptography


CRC Press Handbook Of Applied Cryptography
pdf | 11.39 MB | English | Isbn:‎ B00UVADN9E | Author: Alfred J. Menezes | Year: 1996





      Read more...         

E-BooksCryptography In The Information Society by Boris Ryabko





Cryptography In The Information Society by Boris Ryabko
English | 2021 | ISBN: 9811226156 | 286 pages | True (PDF EPUB) | 17.65 MB
This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.

[center]



      Read more...         

E-BooksAlgorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories





Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories
Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories
English | 2021 | ISBN: 365834458X | 155 Pages | PDF EPUB | 10 MB
In this work, algorithms and architectures for cryptography and source coding are developed, which are suitable for many resource-constrained embedded systems such as non-volatile flash memories. A new concept for elliptic curve cryptography is presented, which uses an arithmetic over Gaussian integers. Gaussian integers are a subset of the complex numbers with integers as real and imaginary parts. Ordinary modular arithmetic over Gaussian integers is computational expensive. To reduce the complexity, a new arithmetic based on the Montgomery reduction is presented. For the elliptic curve point multiplication, this arithmetic over Gaussian integers improves the computational efficiency, the resistance against side channel attacks, and reduces the memory requirements. Furthermore, an efficient variant of the Lempel-Ziv-Welch (LZW) algorithm for universal lossless data compression is investigated. Instead of one LZW dictionary, this algorithm applies several dictionaries to speed up the encoding process. Two dictionary partitioning techniques are introduced that improve the compression rate and reduce the memory size of this parallel dictionary LZW algorithm.



      Read more...         

E-BooksPublic-Key Cryptography - PKC 2021 ()




Public-Key Cryptography - PKC 2021 ()


Public-Key Cryptography - PKC 2021 ()
epub | 60.77 MB | English | Isbn:‎ 978-3662464465 | Author: Juan A. Garay | Year: 2021





      Read more...         

Video TrainingLinkedin - Conversations on Cryptography





Linkedin - Conversations on Cryptography
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 2h 24m | Size: 1.7 GB
In this video from Total Seminars, Mike Meyers is joined by professor of computer science Bill Saichek as they discuss cryptography. Mike and Bill start with the basics of just what cryptography is and the key role it plays in protecting digital data. They then cover important topics like how websites use certificates to make sure usernames, passwords, credit card numbers, and other personal data stay secure; ciphers, binary, hashing, symmetric and asymmetric cryptosystems, digital signatures and certificates, and public key infrastructure; and how hashing helps you to be certain the data you receive or download is legitimate. Whether you're just curious about cryptography, or you want to prepare for the CompTIA Security+ exam (or any other cyber security course), this course will give you a better understanding of this intriguing subject.



      Read more...         

E-BooksCryptography And Networking Security An Introduction





Cryptography And Networking Security An Introduction
English | 2021 | ISBN: 1683926919 | 652 pages | PDF | 20.73 MB
This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through all of the important design andimplementation details of various cryptographic algorithms and network security protocols to enforce network security. The book is divided into four parts:Cryptography, Security Systems, Network Security Applications, and SystemSecurity. Numerous diagrams and examples throughout the book are used toexplain cryptography and network security concepts.
FEATURES:



      Read more...         

Page:

Search



Updates




Friend Sites


» TinyDL
» DownTra
» 0dayHome

Your Link Here ?
(Pagerank 4 or above)