Catalog Search Results
Author
Language
English
Description
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better...
Author
Series
Language
English
Formats
Description
"Organizations in every industry from healthcare to finance rely on cybersecurity professionals to protect one of their most valuable assets - information. For those interested in both high-tech security and computer science, there are many roles and career opportunities from designing network security systems to conducting penetration testing to identifying security weaknesses. This book examines several of those careers, highlighting different jobs,...
Author
Pub. Date
2019.
Language
English
Description
"Security is paramount for any application. Cryptography occurs all across software fields: it protects all HTTPS traffic between browsers, encrypts phone storage against prying eyes, and can even hide files inside other files through a technique called steganography. This course is for developers looking to design a system that uses cryptography, rather than designing new algorithms. Most developers simply need to put the right pieces together to...
Author
Pub. Date
[2021]
Language
English
Description
Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance. Learn by example with source code in C# and .NET, and come away with an understanding of public key encryption systems and challenging cryptography mechanisms such as lattice-based cryptography. Modern cryptography is the lifeboat of a secure infrastructure. From global economies and governments, to meeting everyday consumer needs,...
Author
Pub. Date
2021
Language
English
Description
Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing your own applications and programs using MATLAB. Cryptography...
Author
Pub. Date
[2021]
Language
English
Description
Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented...
Author
Language
English
Formats
Description
Bletchley Park, 1942: As World War II rages on, Honey Deschamps sits at her type-x machine, tediously transcribing decrypted signals from the German Army, doing her part to assist the British war effort. Halfway across the world, Hitler’s armies are marching into Leningrad, leaving a trail of destruction and pillaging the country’s most treasured artworks, including the famous Amber Room―the eighth wonder of the world. As reports begin filtering...
Author
Pub. Date
2022.
Language
English
Description
Get the detailed info you need to prepare for the Cloud Data Security domain of the CCSP exam. The course is mapped to the objectives used in the August 2022 exam release.
Are you a cybersecurity or cloud computing professional preparing for the Cloud Data Security domain of the CCSP exam? In this course, Mike Chapple presents the detailed information you need, using the objectives that will be reflected in the August 2022 exam release. This course...
Author
Pub. Date
2022.
Language
English
Description
Learn how to secure sensitive information with Azure Key Vault.
Do you need to learn how to manage sensitive information for your applications and services? In this course, instructor Nertil Poci shows you how to secure sensitive information with Azure Key Vault. Nertil explains what Azure Key Vault does, then goes over creating Key Vaults, setting up your project dependencies, and securely accessing information stored in Key Vaults. He covers a...
Pub. Date
[2021]
Language
English
Description
It tells the fascinating story of Elizebeth Smith Friedman, the groundbreaking cryptanalyst whose painstaking work decoding thousands of messages for the U.S. government would send infamous gangsters to prison and bring down a massive, near-invisible Nazi spy ring in WWII. A suburban wife and mother who led a secret double life, her remarkable contributions to the science of cryptology would only come to light decades after her death when classified...
Pub. Date
2023.
Language
English
Description
"Mastering CASP+ Security Architecture and Operations"" is an extensive course designed for professionals seeking to deepen their knowledge in advanced security concepts and prepare for the CASP+ exam. The course journey begins with a thorough exploration of Security Architecture, covering crucial topics like network services, segmentation, and Zero Trust models, to build a robust security foundation. As you progress, you'll delve into Security Operations,...
Author
Language
English
Formats
Description
CISSP Study Guide - fully updated for the 2021 CISSP Body of Knowledge (ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex Study Guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on...
Pub. Date
[2023]
Language
English
Description
MATHEMATICS AND COMPUTER SCIENCE This first volume in a new multi-volume set gives readers the basic concepts and applications for diverse ideas and innovations in the field of computing together with its growing interactions with mathematics. This new edited volume from Wiley-Scrivener is the first of its kind to present scientific and technological innovations by leading academicians, eminent researchers, and experts around the world in the areas...
Author
Pub. Date
2016.
Language
English
Description
"Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used-and profitable-than today's most popular web apps. You'll learn how the blockchain's cryptographically stored ledger, scarce-asset model, and peer-to-peer (P2P) technology provide a more flexible, better-incentivized structure...
Author
Pub. Date
2003
Language
English
Description
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows...
Author
Pub. Date
2021.
Language
English
Description
Fully updated computer security essentials-mapped to the CompTIA Security+ SY0-601 exam Save 10% on any CompTIA exam voucher! Coupon code inside. Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-601. This thoroughly revised, full-color textbook covers how to secure hardware, systems, and software. It addresses new threats and cloud environments, and...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request