E-Books → Bhushan S Holistic Approach to Quantum Cryptography in Cyber Security 2023
Published by: Emperor2011 on 9-03-2023, 13:56 | 0
Bhushan S Holistic Approach to Quantum Cryptography in Cyber Security 2023 | 53.71 MB
N/A | 257 Pages
Title: Holistic Approach to Quantum Cryptography in Cyber Security
Author: Shashi Bhushan
Year: N/A
E-Books → Cryptography
Published by: voska89 on 6-03-2023, 05:04 | 0
Free Download William Buchanan, "Cryptography"
English | 2017 | pages: 426 | ISBN: 8793379102 | PDF | 103,2 mb
Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including:full provision of Web-based material on almost every topic coveredprovision of additional on-line material, such as videos, source code, and labscoverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs)Key areas covered include:Fundamentals of EncryptionPublic Key EncryptionSymmetric Key EncryptionHashing MethodsKey Exchange MethodsDigital Certificates and AuthenticationTunnelingCrypto
E-Books → .Net Security and Cryptography
Published by: voska89 on 4-03-2023, 12:35 | 0
Free Download G. Gnana Arun Ganesh, ".Net Security and Cryptography"
English | 2003 | pages: 500 | ISBN: 013100851X | EPUB | 3,1 mb
Including the topic of ASP.NET and Web services security, this text provides an in-depth guide to the world of cryptography and security programming for C# and VB.NET programmers.
Video Training → Applied Cryptography With Python
Published by: voska89 on 1-03-2023, 01:04 | 0
Free Download Applied Cryptography With Python
Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 200.60 MB | Duration: 0h 33m
Protecting Your Data
Video Training → Secret Key Cryptography By Frank Rubin, Video Edition
Published by: voska89 on 17-02-2023, 02:03 | 0
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods.
Released 8/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 109 Lessons (16h 51m) | Size: 2.56 GB
E-Books → Transitioning to Quantum-Safe Cryptography on IBM Z
Published by: voska89 on 15-02-2023, 00:18 | 0
Transitioning to Quantum-Safe Cryptography on IBM Z
English | 2023 | ISBN: 9780738460680 | 293 Pages | EPUB | 2 MB
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography.
E-Books → The Mechanics of 3G Cryptography
Published by: voska89 on 13-02-2023, 18:11 | 0
D Dhebar, "The Mechanics of 3G Cryptography"
English | ISBN: 1445701456 | 2009 | 130 pages | EPUB | 8 MB
There is a plethora of books available on 3G mobile technology in its entirety, but when it comes to the actual mechanics of the cryptographic algorithms involved the information is typically vague. If your interest is in the precise workings of 3G cryptography then this book is for you; it is perhaps the only book of its kind. Every single original algorithm of 3G User Equipment (3G mobile phones) is explained in explicit detail, and each is coupled with a thorough example. The algorithms include the standardised functions, UEA1 for confidentiality and UIA1 for integrity, along with Kasumi, the corresponding kernel algorithm, and also all the non-standardised algorithms for authentication and key agreement, along with their corresponding kernel algorithm, Rijndael (A.E.S.). Contained here is all the information required to literally pencil-and-paper all the cryptographic inputs to outputs of 3G mobiles...patience not included!
E-Books → Baldoni M Elementary Number Theory, Cryptography and Codes 2009
Published by: Emperor2011 on 11-02-2023, 19:40 | 0
Baldoni M Elementary Number Theory, Cryptography and Codes 2009 | 2.69 MB
English | 530 Pages
Title: Elementary Number Theory, Cryptography and Codes
Author: Maria Welleda Baldoni
Year: 2009
E-Books → Koblitz N A Course in Number Theory and Cryptography 2ed 1994
Published by: Emperor2011 on 10-02-2023, 19:36 | 0
Koblitz N A Course in Number Theory and Cryptography 2ed 1994 | 14.25 MB
English | 244 Pages
Title: A Course in Number Theory and Cryptography (Graduate Texts in Mathematics, 114)
Author: Neal Koblitz
Year: 1994
E-Books → Buchmann J Coding Theory, Cryptography and Related Areas 2000
Published by: Emperor2011 on 10-02-2023, 16:13 | 0
Buchmann J Coding Theory, Cryptography and Related Areas 2000 | 8.09 MB
N/A | 269 Pages
Title: Hasbro Gaming: Jenga Classic Game
Author: J. Buchmann
Year: N/A