free Cryptography eBooks

Page: 1-10 results of 1710
Hacking (FREE Bonus Included) Hacking for Beginners: 48 Things Every Hacker Must Know About How to Hack Hacking. An art, curse, piece of knowledge, illegality, business or an insatiable thirst for power and money? How can a word represent all that and much more? How can a notion become so synonymous to politics and power that they both are afraid of it? All these questions and their responses are inductive enough to have a great number of... more...
Hackers are a global fascination with cybercrime representing our single biggest threat to national security. But putting their sinister motives aside, the dark underworld of hackers contains some of the most creative minds on the planet.
Key Features Configure and manage Linux servers in varying scenarios and for a range of business requirements Explore the up-to-date features of CentOS using real-world scenarios See practical and extensive recipes to deploy and manage CentOS Book Description CentOS is derived from Red Hat Enterprise Linux (RHEL) sources and is widely used as a Linux server. This book will help you to better configure and manage... more...
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate.... more...
“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.” —Charles C. Palmer, IBM Research  The Modern Introduction to Computer... more...
Offering carefully curated articles from the European Association of Psychology and Law (EAPL), this book features chapters from a truly international group of scholars. This text is the first of its kind to offer insights into current developments in psychology and law in Russia. The field of psychology and law has a very long and strong tradition in Russia, but very little is known, as Russian scholars rarely publish their works in... more...
As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC.... more...
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab... more...
Leverage the power of digital forensics for Windows systems About This Book Build your own lab environment to analyze forensic data and practice techniques. This book offers meticulous coverage with an example-driven approach and helps you build the key skills of performing forensics on Windows-based systems using digital artifacts. It uses specific open source and Linux-based tools so you can become proficient at analyzing forensic data and upgrade... more...
Page: 1-10 results of 1710