Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

Buy

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Security Professional).

(HTML tags aren't allowed.)

Assembly Language for Intel-Based Computers (4th Edition)
Assembly Language for Intel-Based Computers (4th Edition)
For undergraduate courses in assembly language programming and introductory courses in computer systems and computer architecture. This complete and fully updated study of assembly language for the IBM-PC teaches students how to write and debug programs at the machine level. Based on the Intel processor family, the text simplifies and...
Raspberry Pi For Dummies
Raspberry Pi For Dummies

Embrace the exciting new technology of Raspberry Pi!

With the invention of the unique credit-card sized single-board computer, the Raspberry Pi, comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities of the Raspberry Pi, and this is the perfect guide to get you started...

Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)

Essential to database design, entity-relationship (ER) diagrams are known for their usefulness in mapping out clear database designs. They are also well-known for being difficult to master. With Database Design Using Entity-Relationship Diagrams, Second Edition, database designers, developers, and students preparing...


Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Algorithm Design for Networked Information Technology Systems
Algorithm Design for Networked Information Technology Systems

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy