Cryptography
epub |eng | 2021-04-15 | Author:Jessica Barker [Barker, Jessica]
Anti-phishing Phishing attacks seem to be the main vector for so many cyberattacks these days, and, as a result, CISOs have to design their behaviour change projects accordingly. As shown ...
( Category:
Security & Encryption
September 20,2022 )
pdf | | 2013-09-11 | Author:Unknown
( Category:
Security & Encryption
August 6,2022 )
pdf | | 2019-06-06 | Author:SUNTECH
( Category:
Security & Encryption
July 9,2022 )
pdf |en | | Author: Dan McTeer, Bryan Krausen
( Category:
Security & Encryption
June 17,2022 )
pdf |en | | Author: Richard Seiersen
( Category:
Security & Encryption
May 14,2022 )
pdf | | 2020-09-01 | Author:Steven D Shepard, Phd & Gary C Kessler, Phd [Steven D Shepard, Phd & Gary C Kessler, Phd]
( Category:
Security & Encryption
April 24,2022 )
pdf | | 2017-10-23 | Author:William Stallings
( Category:
Security & Encryption
April 22,2022 )
pdf |en | | Author: Justin Carroll
( Category:
Security & Encryption
April 17,2022 )
epub |eng | 2022-02-21 | Author:Bonney, Hayslip, Stamper
( Category:
Security & Encryption
February 28,2022 )
epub |eng | | Author:Kamaljeet Sandhu;
Chapter 11 Digital Transformation and Cybersecurity Challenges: A Study of Malware Detection Using Machine Learning Techniques Fatimah Al Obaidan Imam Abdulrahman Bin Faisal University, Saudi Arabia Saqib Saeed https://orcid.org/0000-0001-7136-3480 Imam ...
( Category:
Security & Encryption
February 17,2022 )
pdf |en | | Author: Kamaljeet Sandhu (editor)
( Category:
Security & Encryption
February 17,2022 )
epub |eng | 2020-03-09 | Author:Marcus J. Carey & Jennifer Jin [Carey, Marcus J. & Jennifer Jin]
What's the most important decision you've made or action you've taken related to a business risk? I love this question. Recently I gave a speech at the final DerbyCon about ...
( Category:
Cryptography
July 4,2020 )
azw3 |eng | 2001-08-05 | Author:Oded Goldreich [Goldreich, Oded]
4.2. Interactive Proof Systems In this section we introduce the notion of an interactive proof system and present a non-trivial example of such a system (specifically to claims of the ...
( Category:
Coding Theory
June 27,2020 )
epub |eng | 2013-05-01 | Author:Loshin, Peter
“Did you see those last three lines there? The digital signature checked out, and it says that Sam Mallory, me, signed it--but these three lines tell you that GnuPG thinks ...
( Category:
Cryptography
May 26,2020 )
epub |eng | 2020-03-30 | Author:Keith Martin
How to Save the World Here’s cryptography in action, as often witnessed on television dramas (and the likes of James Bond movies). Two intelligence agents sit tensely in a car, ...
( Category:
Cryptography
May 22,2020 )
Categories
Popular ebooks
Learn Ethereum by Xun (Brian) Wu(1400)Hands-On Cryptography with Python by Samuel Bowne(1336)
Hyperledger Cookbook by Xun (Brian) Wu(1309)
Hands-On IoT Solutions with Blockchain by Maximiliano Santos(1084)
Hands-On Blockchain with Hyperledger by Nitin Gaur(964)
Cryptography: The Key to Digital Security, How It Works, and Why It Matters by Keith Martin(643)
Cryptography by Keith Martin(607)
Hacking Connected Cars : Tactics, Techniques, and Procedures (9781119491736) by Knight Alissa(517)
Simple Steps to Data Encryption by Loshin Peter(492)
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Singh Simon(418)
Foundations of Cryptography: Volume 1, Basic Tools by Oded Goldreich(400)
Tribe of Hackers Security Leaders by Marcus J. Carey & Jennifer Jin(366)
Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham(340)
Quantum Computing for Computer Scientists (9781139634120) by Yanofsky Noson S.; Mannucci Mirco A(308)
Cryptography Apocalypse by Roger A. Grimes(284)
Practical OPNsense: Building Enterprise Firewalls With Open Source by Markus Stubbig(181)
Malware Analyst's Cookbook: Tools and Techniques for Fighting Malicious Code by Ligh Michael & Adair Steven & Hartstein Blake & Richard Matthew(126)
Cybersecurity ABCs by Jessica Barker(118)
Database and Application Security by R. Sarma Danturthi;(113)
CISO Desk Reference Guide Executive Primer by Bonney Hayslip Stamper(100)
