Login: Password:  Do not remember me

Categories




E-BooksBhushan S Holistic Approach to Quantum Cryptography in Cyber Security 2023




Bhushan S  Holistic Approach to Quantum Cryptography in Cyber Security 2023

Bhushan S Holistic Approach to Quantum Cryptography in Cyber Security 2023 | 53.71 MB
N/A | 257 Pages

Title: Holistic Approach to Quantum Cryptography in Cyber Security
Author: Shashi Bhushan
Year: N/A




      Read more...         

E-BooksCryptography



Cryptography
Free Download William Buchanan, "Cryptography"
English | 2017 | pages: 426 | ISBN: 8793379102 | PDF | 103,2 mb
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including:full provision of Web-based material on almost every topic coveredprovision of additional on-line material, such as videos, source code, and labscoverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs)Key areas covered include:Fundamentals of EncryptionPublic Key EncryptionSymmetric Key EncryptionHashing MethodsKey Exchange MethodsDigital Certificates and AuthenticationTunnelingCrypto



      Read more...         

E-Books.Net Security and Cryptography



.Net Security and Cryptography
Free Download G. Gnana Arun Ganesh, ".Net Security and Cryptography"
English | 2003 | pages: 500 | ISBN: 013100851X | EPUB | 3,1 mb
Including the topic of ASP.NET and Web services security, this text provides an in-depth guide to the world of cryptography and security programming for C# and VB.NET programmers.



      Read more...         

Video TrainingApplied Cryptography With Python



Applied Cryptography With Python
Free Download Applied Cryptography With Python
Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 200.60 MB | Duration: 0h 33m
Protecting Your Data



      Read more...         

Video TrainingSecret Key Cryptography By Frank Rubin, Video Edition



Secret Key Cryptography By Frank Rubin, Video Edition
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods.
Released 8/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 109 Lessons (16h 51m) | Size: 2.56 GB



      Read more...         

E-BooksTransitioning to Quantum-Safe Cryptography on IBM Z



Transitioning to Quantum-Safe Cryptography on IBM Z
Transitioning to Quantum-Safe Cryptography on IBM Z
English | 2023 | ISBN: 9780738460680 | 293 Pages | EPUB | 2 MB
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography.



      Read more...         

E-BooksThe Mechanics of 3G Cryptography



The Mechanics of 3G Cryptography
D Dhebar, "The Mechanics of 3G Cryptography"
English | ISBN: 1445701456 | 2009 | 130 pages | EPUB | 8 MB
There is a plethora of books available on 3G mobile technology in its entirety, but when it comes to the actual mechanics of the cryptographic algorithms involved the information is typically vague. If your interest is in the precise workings of 3G cryptography then this book is for you; it is perhaps the only book of its kind. Every single original algorithm of 3G User Equipment (3G mobile phones) is explained in explicit detail, and each is coupled with a thorough example. The algorithms include the standardised functions, UEA1 for confidentiality and UIA1 for integrity, along with Kasumi, the corresponding kernel algorithm, and also all the non-standardised algorithms for authentication and key agreement, along with their corresponding kernel algorithm, Rijndael (A.E.S.). Contained here is all the information required to literally pencil-and-paper all the cryptographic inputs to outputs of 3G mobiles...patience not included!



      Read more...         

E-BooksBaldoni M Elementary Number Theory, Cryptography and Codes 2009




Baldoni M  Elementary Number Theory, Cryptography and Codes 2009

Baldoni M Elementary Number Theory, Cryptography and Codes 2009 | 2.69 MB
English | 530 Pages

Title: Elementary Number Theory, Cryptography and Codes
Author: Maria Welleda Baldoni
Year: 2009




      Read more...         

E-BooksKoblitz N A Course in Number Theory and Cryptography 2ed 1994




Koblitz N  A Course in Number Theory and Cryptography 2ed 1994

Koblitz N A Course in Number Theory and Cryptography 2ed 1994 | 14.25 MB
English | 244 Pages

Title: A Course in Number Theory and Cryptography (Graduate Texts in Mathematics, 114)
Author: Neal Koblitz
Year: 1994




      Read more...         

E-BooksBuchmann J Coding Theory, Cryptography and Related Areas 2000




Buchmann J  Coding Theory, Cryptography and Related Areas 2000

Buchmann J Coding Theory, Cryptography and Related Areas 2000 | 8.09 MB
N/A | 269 Pages

Title: Hasbro Gaming: Jenga Classic Game
Author: J. Buchmann
Year: N/A




      Read more...         

Page:

Search



Updates




Friend Sites


» TinyDL
» DownTra
» 0dayHome

Your Link Here ?
(Pagerank 4 or above)