Science / Cryptography eBooks

2015 | 676 Pages | ISBN: 3662464934 | PDF | 7.4 MB The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2...

( Category:Cryptography Date:16 Mar 2017 )

English | 2014 | ISBN: 331912059X | PDF | 349 Pages | 8.6 mb This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography Engineeri...

( Category:Cryptography Date:16 Mar 2017 )

ISBN: 0470920416 | 2011 | EPUB | 696 Pages | 7 MB Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this ...

( Category:Cryptography Date:16 Mar 2017 )

2015 | 715 Pages | ISBN: 3662464969 | PDF | 7.3 MB The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2...

( Category:Cryptography Date:13 Mar 2017 )

CRC Press | English | Feb. 21 2017 | ISBN-10: 1498727107 | 496 Pages | PDF | 11.34 mb by Donald A. Wilson (Author) Features Provides a comprehensive analysis of the concept Looks at state-by-state cou...

( Category:Cryptography Date:05 Mar 2017 )

English | 5 Mar. 2007 | ISBN: 3540681345 | 281 Pages | PDF | 3 MB The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined i...

( Category:Cryptography Date:28 Feb 2017 )

English | 2017 | ISBN: 3319521527 | 452 Pages | PDF | 13.24 MB This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisc...

( Category:Cryptography Date:23 Feb 2017 )

Wiley | English | March 2017 | ISBN-10: 1119231507 | 528 Pages | PDF | 2.89 mb by Jeff Kosseff (Author) A definitive guide to cybersecurity law Expanding on the author's experience as a cybersecurity ...

( Category:Cryptography Date:22 Feb 2017 )

English | 2004 | ISBN: 0521830842 | 448 Pages | PDF | 1.86 MB Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. Th...

( Category:Cryptography Date:14 Feb 2017 )

English | 2 Jun. 2010 | ISBN: 3642033164 | 425 Pages | PDF | 7 MB The workshop's main topic is symmetric key cryptography, including the designoffast and securesymmetric key primitives,suchas block ci...

( Category:Cryptography Date:08 Feb 2017 )

Cambridge | English | 2016 | ISBN-10: 1107010837 | 395 Pages | PDF | 14.78 mb Editors: S. Barry Cooper, University of Leeds, Andrew Hodges, University of Oxford Alan Turing (1912-1954) made seminal co...

( Category:Cryptography Date:13 Jan 2017 )

2016 | ISBN: 1482299801 | English | 538 Pages | PDF | 5 MB This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a...

( Category:Cryptography Date:28 Dec 2016 )

2016 | ISBN: 331928777X | English | 203 Pages | PDF | 1 MB This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on...

( Category:Cryptography Date:21 Dec 2016 )

2001 | ISBN: 007213139X | English | 449 Pages | PDF | 9 MB Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed ...

( Category:Cryptography Date:21 Dec 2016 )

Springer | Security & Cryptology | December 2. 2016 | ISBN-10: 3319478117 | 108 Pages | PDF | 3.25 MB Authors: Zhang, Mu, Yin, Heng This SpringerBrief explains the emerging cyber threats that undermin...

( Category:Cryptography Date:12 Dec 2016 )

**Categories**

Astronomy and Cosmology | Physics |

Philosophy | Medicine |

Mathematics | DSP |

Cryptography |
Chemistry |

Biology and Genetics | Psychology and Behavior |

**Popular ebooks**

Introduction to Coding Theory, Second Edit(1114)

The Once and Future Turing: Computing the (1035)

Introduction to Certificateless Cryptograp(940)

Cybersecurity Law(906)

Friedrich L. Bauer - Decrypted Secrets: Me(860)

Secure Data Deletion(830)

Android Application Security: A Semantics (755)

Secure Data Deletion(750)

Steve Burnett, Stephen Paine - RSA Securit(654)

Steve Burnett, Stephen Paine - RSA Securit(650)

Theory of Cryptography, Part I(620)

Cryptographic Hardware and Embedded System(618)

Theory of Cryptography, Part II(605)

Foundations of Cryptography Volume II Basi(556)

Implementing SSL / TLS Using Cryptography (535)

Friedrich L. Bauer - Decrypted Secrets: Me(531)

Fast Software Encryption(528)

Topics in Cryptology - CT-RSA 2017: The Cr(299)

Cryptographic Hardware and Embedded System(299)