Cryptography and security services mechanisms and applications
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptog...
Saved in:
| Main Author: | Mogollon, Manuel |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Cybertech Pub.
2007
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Identity-based cryptography
Published: (2009)
Published: (2009)
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Applications of secure multiparty computation
Published: (2015)
Published: (2015)
Cryptography and network security principles and practices
by: Stallings
Published: (2003)
by: Stallings
Published: (2003)
Cryptography and network security principles and practice
by: Stallings
Published: (1998)
by: Stallings
Published: (1998)
Understanding cryptography a textbook for students and practitioners
by: Paar, Christof, et al.
Published: (2010)
by: Paar, Christof, et al.
Published: (2010)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Crafting the infosec playbook
by: Bollinger, Jeff, et al.
Published: (2015)
by: Bollinger, Jeff, et al.
Published: (2015)
Computer security a comprehensive controls checklist
by: lh
Published: (1987)
by: lh
Published: (1987)
Cryptography, automata and learning theory
Published: (2011)
Published: (2011)
Security in computing
by: Pfleeger lhCharles P.
by: Pfleeger lhCharles P.
Writing secure code
by: Howard, Michael 1965-
Published: (2003)
by: Howard, Michael 1965-
Published: (2003)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Handbook of applied cryptography
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
by: Menezes, A. J. (Alfred J.) 1965-, et al.
Published: (1997)
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
Kali Linux cookbook effective penetration testing solutions
by: Schultz, Corey P., et al.
Published: (2017)
by: Schultz, Corey P., et al.
Published: (2017)
Public-key cryphotography
by: Salomaa
Published: (1996)
by: Salomaa
Published: (1996)
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)
by: Dotson, Chris
Published: (2019)
Securing information and communications systems principles, technologies, and applications
Published: (2008)
Published: (2008)
Quantum communications and cryptography
Published: (2006)
Published: (2006)
Innovative solutions for access control management
Published: (2016)
Published: (2016)
Network security assessment know your network
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
Multimedia forensics and security
Published: (2009)
Published: (2009)
Digital identity management
Published: (2015)
Published: (2015)
Information security, coding theory and related combinatorics information coding and combinatorics
Published: (2011)
Published: (2011)
The Kish cypher the story of KLJN for unconditional security
by: Kish, Laszlo B.
Published: (2017)
by: Kish, Laszlo B.
Published: (2017)
Multilevel modeling of secure systems in QoP-ML
by: Ksįeżopolski, Bogdan
Published: (2015)
by: Ksįeżopolski, Bogdan
Published: (2015)
Big data analytics with applications in insider threat detection
by: Thuraisingham, Bhavani, et al.
Published: (2018)
by: Thuraisingham, Bhavani, et al.
Published: (2018)
Digital watermarking 6th International Workshop, IWDW 2007, Guanzhou, China, December 3-5, 2007 : proceedings
Published: (2008)
Published: (2008)
Quantum cryptography and computing--theory and implementation
Published: (2010)
Published: (2010)
Building virtual pentesting labs for advanced penetration testing learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
by: Cardwell, Kevin
Published: (2016)
by: Cardwell, Kevin
Published: (2016)
Metasploit bootcamp a fast-paced guide to enhance your pentesting skills
by: Jaswal, Nipun
Published: (2017)
by: Jaswal, Nipun
Published: (2017)
The basics of digital privacy simple tools to protect your personal your information and your identity online
by: Cherry, Denny
Published: (2014)
by: Cherry, Denny
Published: (2014)
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
Similar Items
-
Cryptography protocols, design, and applications
Published: (2012) -
Identity-based cryptography
Published: (2009) -
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013) -
Applications of secure multiparty computation
Published: (2015) -
Cryptography and network security principles and practices
by: Stallings
Published: (2003)


