Science / Cryptography eBooks
2015 | 676 Pages | ISBN: 3662464934 | PDF | 7.4 MB The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2...
English | 2014 | ISBN: 331912059X | PDF | 349 Pages | 8.6 mb This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography Engineeri...
ISBN: 0470920416 | 2011 | EPUB | 696 Pages | 7 MB Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this ...
2015 | 715 Pages | ISBN: 3662464969 | PDF | 7.3 MB The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2...
( Category:Cryptography Date:13 Mar 2017 )
CRC Press | English | Feb. 21 2017 | ISBN-10: 1498727107 | 496 Pages | PDF | 11.34 mb by Donald A. Wilson (Author) Features Provides a comprehensive analysis of the concept Looks at state-by-state cou...
( Category:Cryptography Date:05 Mar 2017 )
English | 5 Mar. 2007 | ISBN: 3540681345 | 281 Pages | PDF | 3 MB The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined i...
( Category:Cryptography Date:28 Feb 2017 )
English | 2017 | ISBN: 3319521527 | 452 Pages | PDF | 13.24 MB This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisc...
( Category:Cryptography Date:23 Feb 2017 )
Wiley | English | March 2017 | ISBN-10: 1119231507 | 528 Pages | PDF | 2.89 mb by Jeff Kosseff (Author) A definitive guide to cybersecurity law Expanding on the author's experience as a cybersecurity ...
( Category:Cryptography Date:22 Feb 2017 )
English | 2004 | ISBN: 0521830842 | 448 Pages | PDF | 1.86 MB Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. Th...
( Category:Cryptography Date:14 Feb 2017 )
English | 2 Jun. 2010 | ISBN: 3642033164 | 425 Pages | PDF | 7 MB The workshop's main topic is symmetric key cryptography, including the designoffast and securesymmetric key primitives,suchas block ci...
( Category:Cryptography Date:08 Feb 2017 )
Cambridge | English | 2016 | ISBN-10: 1107010837 | 395 Pages | PDF | 14.78 mb Editors: S. Barry Cooper, University of Leeds, Andrew Hodges, University of Oxford Alan Turing (1912-1954) made seminal co...
( Category:Cryptography Date:13 Jan 2017 )
2016 | ISBN: 1482299801 | English | 538 Pages | PDF | 5 MB This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a...
( Category:Cryptography Date:28 Dec 2016 )
2016 | ISBN: 331928777X | English | 203 Pages | PDF | 1 MB This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on...
( Category:Cryptography Date:21 Dec 2016 )
2001 | ISBN: 007213139X | English | 449 Pages | PDF | 9 MB Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed ...
( Category:Cryptography Date:21 Dec 2016 )
Springer | Security & Cryptology | December 2. 2016 | ISBN-10: 3319478117 | 108 Pages | PDF | 3.25 MB Authors: Zhang, Mu, Yin, Heng This SpringerBrief explains the emerging cyber threats that undermin...
( Category:Cryptography Date:12 Dec 2016 )
|Astronomy and Cosmology||Physics|
|Biology and Genetics||Psychology and Behavior|
Popular ebooksAlgebra for Cryptologists (Springer Underg(1318)
Introduction to Coding Theory, Second Edit(1114)
The Once and Future Turing: Computing the (1035)
Introduction to Certificateless Cryptograp(940)
Friedrich L. Bauer - Decrypted Secrets: Me(860)
Secure Data Deletion(830)
Android Application Security: A Semantics (755)
Secure Data Deletion(750)
Steve Burnett, Stephen Paine - RSA Securit(654)
Steve Burnett, Stephen Paine - RSA Securit(650)
Theory of Cryptography, Part I(620)
Cryptographic Hardware and Embedded System(618)
Theory of Cryptography, Part II(605)
Foundations of Cryptography Volume II Basi(556)
Implementing SSL / TLS Using Cryptography (535)
Friedrich L. Bauer - Decrypted Secrets: Me(531)
Fast Software Encryption(528)
Topics in Cryptology - CT-RSA 2017: The Cr(299)
Cryptographic Hardware and Embedded System(299)