Cryptography

A method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.

All categories

Books under this sub-category (35 books)

Hacking Secret Ciphers with Python: A beginners guide to cryptography and computer programming with Python

Post date: 18 Apr 2016
This book teaches you how to write your own cipher programs and also the hacking programs that can break the encrypted messages from these ciphers.
 
Hacking Secret Ciphers with Python: A beginners guide to cryptography and computer programming with Python

Hacking Secret Ciphers with Python: A beginners guide to cryptography and computer programming with Python

Post date: 18 Apr 2016
This book teaches you how to write your own cipher programs and also the hacking programs that can break the encrypted messages from these ciphers.

Hacking the Xbox: An Introduction to Reverse Engineering, 1st Edition

Post date: 26 Sep 2016
This book shows you how to open an Xbox, make modifications to it (from a cosmetic LED color change, to putting in a new power supply, to adding a USB connector), and make the changes needed to get Linux running on it.
Publisher: No Starch Press
Publication date: 01 Mar 2013
License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported
Document Type: Book
 
Hacking the Xbox: An Introduction to Reverse Engineering, 1st Edition

Hacking the Xbox: An Introduction to Reverse Engineering, 1st Edition

Post date: 26 Sep 2016
This book shows you how to open an Xbox, make modifications to it (from a cosmetic LED color change, to putting in a new power supply, to adding a USB connector), and make the changes needed to get Linux running on it.
Publisher: No Starch Press
Publication date: 01 Mar 2013
License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported Document Type: Book


Handbook for Bloggers and Cyber-Dissidents

Post date: 28 May 2007
A handbook from Reporters Without Borders with handy tips and technical advice on how to to remain anonymous and to get around censorship, and how to establish credibility through observing basic ethical and journalistic principles.
Publication date: 01 Sep 2005
Document Type: Book
 
Handbook for Bloggers and Cyber-Dissidents

Handbook for Bloggers and Cyber-Dissidents

Post date: 28 May 2007
A handbook from Reporters Without Borders with handy tips and technical advice on how to to remain anonymous and to get around censorship, and how to establish credibility through observing basic ethical and journalistic principles.
Publication date: 01 Sep 2005
Document Type: Book


Handbook of Applied Cryptography

Post date: 19 Sep 2005
This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material.
Publisher: CRC Press
Publication date: 01 Oct 1996
Document Type: Book
 
Handbook of Applied Cryptography

Handbook of Applied Cryptography

Post date: 19 Sep 2005
This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material.
Publisher: CRC Press
Publication date: 01 Oct 1996
Document Type: Book


Information Security for Journalists

Post date: 20 Nov 2016
A practical handbook for journalists and investigative reporters in particular. It lays out the most effective means of keeping your work private and safe from spying.
Publication date: 01 May 2016
License: Creative Commons Attribution 4.0 International
Document Type: Book
 
Information Security for Journalists

Information Security for Journalists

Post date: 20 Nov 2016
A practical handbook for journalists and investigative reporters in particular. It lays out the most effective means of keeping your work private and safe from spying.
Publication date: 01 May 2016
License: Creative Commons Attribution 4.0 International Document Type: Book


Introduction to Modern Cryptography

Post date: 23 Sep 2006
This document focuses on modern cryptography as a science. Includes topics on block ciphers, pseudorandom, symmetric and asymmetric encryption, hash, authentication and digital signatures.
Publication date: 01 Sep 2005
Document Type: Lecture Notes
 
Introduction to Modern Cryptography

Introduction to Modern Cryptography

Post date: 23 Sep 2006
This document focuses on modern cryptography as a science. Includes topics on block ciphers, pseudorandom, symmetric and asymmetric encryption, hash, authentication and digital signatures.
Publication date: 01 Sep 2005
Document Type: Lecture Notes


Lecture Notes on Cryptography

Post date: 31 Mar 2007
A set of 283 pages lecture notes for a summer course on cryptography, taught by the authors at the Massachusetts Institute of Technology (MIT).
Publication date: 01 Aug 2001
Document Type: Lecture Notes
 
Lecture Notes on Cryptography

Lecture Notes on Cryptography

Post date: 31 Mar 2007
A set of 283 pages lecture notes for a summer course on cryptography, taught by the authors at the Massachusetts Institute of Technology (MIT).
Publication date: 01 Aug 2001
Document Type: Lecture Notes


Math in Society, Edition 2.4

Post date: 10 Dec 2016
This book is an exploration of the wide world of mathematics, with interesting applications to everyday life. It highlights algorithmic, graphical, algebraic, statistical, and analytic approaches to solving problems.
Publication date: 31 Dec 2013
License: Creative Commons Attribution-ShareAlike 3.0 United States
Document Type: Book
 
Math in Society, Edition 2.4

Math in Society, Edition 2.4

Post date: 10 Dec 2016
This book is an exploration of the wide world of mathematics, with interesting applications to everyday life. It highlights algorithmic, graphical, algebraic, statistical, and analytic approaches to solving problems.
Publication date: 31 Dec 2013
License: Creative Commons Attribution-ShareAlike 3.0 United States Document Type: Book


Mathematical Cryptology

Post date: 24 Jul 2016
The notes for the course MAT-52606 Mathematical Cryptology at TUT Finlandia. They contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols.
Publication date: 01 Jan 2014
Document Type: Lecture Notes
 
Mathematical Cryptology

Mathematical Cryptology

Post date: 24 Jul 2016
The notes for the course MAT-52606 Mathematical Cryptology at TUT Finlandia. They contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols.
Publication date: 01 Jan 2014
Document Type: Lecture Notes


Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Publisher: Caxton Business & Legal Inc.
Publication date: 01 Oct 2015
Document Type: Book
 
Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Publisher: Caxton Business & Legal Inc.
Publication date: 01 Oct 2015
Document Type: Book


Privacy on the Line: The Politics of Wiretapping and Encryption

Post date: 15 Nov 2016
This book discusses the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated edition covers recent controversies over NSA spying and other government threats to communications privacy.
Publisher: The MIT Press
Publication date: 01 Feb 2010
License: Standard Copyright License
Document Type: Book
 
Privacy on the Line: The Politics of Wiretapping and Encryption

Privacy on the Line: The Politics of Wiretapping and Encryption

Post date: 15 Nov 2016
This book discusses the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated edition covers recent controversies over NSA spying and other government threats to communications privacy.
Publisher: The MIT Press
Publication date: 01 Feb 2010
License: Standard Copyright License Document Type: Book


Rethinking Public Key Infrastructures and Digital Certificates

Post date: 11 Oct 2006
This book proposes highly practical cryptographic building blocks that can be used to design privacy-protecting electronic communication and transaction systems.
Publisher: The MIT Press
Publication date: 01 Aug 2000
Document Type: Book
 
Rethinking Public Key Infrastructures and Digital Certificates

Rethinking Public Key Infrastructures and Digital Certificates

Post date: 11 Oct 2006
This book proposes highly practical cryptographic building blocks that can be used to design privacy-protecting electronic communication and transaction systems.
Publisher: The MIT Press
Publication date: 01 Aug 2000
Document Type: Book


Reverse Engineering for Beginners

Post date: 22 Nov 2016
This book is about the reverse engineering of softwares as in researching compiled programs. Basic understanding of C/C++ is desirable.
Publication date: 19 Nov 2016
License: Creative Commons Attribution-ShareAlike 4.0 International
Document Type: Book
 
Reverse Engineering for Beginners

Reverse Engineering for Beginners

Post date: 22 Nov 2016
This book is about the reverse engineering of softwares as in researching compiled programs. Basic understanding of C/C++ is desirable.
Publication date: 19 Nov 2016
License: Creative Commons Attribution-ShareAlike 4.0 International Document Type: Book


Safeguarding Your Technology

Post date: 19 Dec 2007
Written to help educational administrators and staff at the building, campus, district, and state levels better understand why and how to effectively secure their organization's sensitive information, critical systems, and computer equipment.
Publication date: 31 Dec 1998
 
Safeguarding Your Technology

Safeguarding Your Technology

Post date: 19 Dec 2007
Written to help educational administrators and staff at the building, campus, district, and state levels better understand why and how to effectively secure their organization's sensitive information, critical systems, and computer equipment.
Publication date: 31 Dec 1998


Securing Java: Getting Down to Business with Mobile Code

Post date: 24 Oct 2004
Helps the reader to separate fact from fiction when it comes to mobile code security from throughout the entire Java range.
Publisher: John Wiley & Sons
Publication date: 01 Jan 1999
Document Type: Book
 
Securing Java: Getting Down to Business with Mobile Code

Securing Java: Getting Down to Business with Mobile Code

Post date: 24 Oct 2004
Helps the reader to separate fact from fiction when it comes to mobile code security from throughout the entire Java range.
Publisher: John Wiley & Sons
Publication date: 01 Jan 1999
Document Type: Book


Book Categories
Sponsors
Icons8, a free icon pack