Science / Cryptography eBooks
2016 | ISBN: 331928777X | English | 203 Pages | PDF | 1 MB This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on...
( Category:Cryptography Date:21 Dec 2016 )
2001 | ISBN: 007213139X | English | 449 Pages | PDF | 9 MB Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed ...
( Category:Cryptography Date:21 Dec 2016 )
Springer | Security & Cryptology | December 2. 2016 | ISBN-10: 3319478117 | 108 Pages | PDF | 3.25 MB Authors: Zhang, Mu, Yin, Heng This SpringerBrief explains the emerging cyber threats that undermin...
( Category:Cryptography Date:12 Dec 2016 )
2006 | ISBN: 3540245022 | English | 555 Pages | PDF | 13.3 MB In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Incre...
( Category:Cryptography Date:12 Dec 2016 )
2001 | ISBN: 007213139X | English | 449 Pages | PDF | 9 MB Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed ...
( Category:Cryptography Date:29 Nov 2016 )
2016 | ISBN: 331928777X | English | 203 Pages | PDF | 1 MB This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on...
( Category:Cryptography Date:26 Nov 2016 )
2006 | ISBN: 3540245022 | English | 555 Pages | PDF | 13.3 MB In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Incre...
( Category:Cryptography Date:25 Nov 2016 )
December 2. 2016 | ISBN-10: 3319478117 | 108 Pages | PDF | 3.25 MB Authors: Zhang, Mu, Yin, Heng This SpringerBrief explains the emerging cyber threats that undermine Android application security. It ...
( Category:Cryptography Date:19 Nov 2016 )
English | 5 July 2013 | ISBN: 1420079468 | 333 Pages | PDF | 12 MB The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application a...
( Category:Cryptography Date:13 Nov 2016 )
CRC Press | Cryptography | Aug. 23 2016 | ISBN-10: 1482248603 | 338 Pages | PDF | 6.14 mb by Hu Xiong (Author), Zhen Qin (Author), Athanasios V. Vasilakos (Author) As an intermediate model between con...
( Category:Cryptography Date:11 Nov 2016 )
English | 30 July 2013 | ISBN: 3642403484 | 504 Pages | PDF | 21 MB The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptogr...
( Category:Cryptography Date:11 Nov 2016 )
English | Oct. 10, 2008 | ISBN: 3540229191 | 315 Pages | PDF | 6 MB Sincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held...
( Category:Cryptography Date:31 Oct 2016 )
English | 30 July 2013 | ISBN: 3642403484 | 504 Pages | PDF | 21 MB The papers are organized in the following topical sections: side-channel attacks; physical unclonable function; lightweight cryptogr...
( Category:Cryptography Date:30 Oct 2016 )
English | ISBN: 3319418041 | 2016 | PDF | 218 Pages | 8.17 MB This edited book is devoted to environmental risk management in gas industry impacted polar ecosystems of Russia, one of the hottest topic...
( Category:Cryptography Date:28 Oct 2016 )
English | ISBN: 3319441906 | 2017 | PDF | 151 Pages | 6.50 MB This book covers an overview of research on sediment textures, sedimentary structures, sediment composition and bioturbation structures in...
( Category:Cryptography Date:28 Oct 2016 )