Cryptography

A method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.

All categories

Books under this sub-category (37 books)

Hacking the Xbox: An Introduction to Reverse Engineering, 1st Edition

Post date: 26 Sep 2016
This book shows you how to open an Xbox, make modifications to it (from a cosmetic LED color change, to putting in a new power supply, to adding a USB connector), and make the changes needed to get Linux running on it.
Publisher: No Starch Press
Publication date: 01 Mar 2013
License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported
Document Type: Book
 
Hacking the Xbox: An Introduction to Reverse Engineering, 1st Edition

Hacking the Xbox: An Introduction to Reverse Engineering, 1st Edition

Post date: 26 Sep 2016
This book shows you how to open an Xbox, make modifications to it (from a cosmetic LED color change, to putting in a new power supply, to adding a USB connector), and make the changes needed to get Linux running on it.
Publisher: No Starch Press
Publication date: 01 Mar 2013
License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported Document Type: Book


Handbook for Bloggers and Cyber-Dissidents

Post date: 28 May 2007
A handbook from Reporters Without Borders with handy tips and technical advice on how to to remain anonymous and to get around censorship, and how to establish credibility through observing basic ethical and journalistic principles.
Publication date: 01 Sep 2005
Document Type: Book
 
Handbook for Bloggers and Cyber-Dissidents

Handbook for Bloggers and Cyber-Dissidents

Post date: 28 May 2007
A handbook from Reporters Without Borders with handy tips and technical advice on how to to remain anonymous and to get around censorship, and how to establish credibility through observing basic ethical and journalistic principles.
Publication date: 01 Sep 2005
Document Type: Book


Handbook of Applied Cryptography

Post date: 19 Sep 2005
This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material.
Publisher: CRC Press
Publication date: 01 Oct 1996
Document Type: Book
 
Handbook of Applied Cryptography

Handbook of Applied Cryptography

Post date: 19 Sep 2005
This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material.
Publisher: CRC Press
Publication date: 01 Oct 1996
Document Type: Book


Image Steganography and Steganalysis

Post date: 19 Jul 2010
This paper provides in-depth descriptions of both steganography, the art of hiding information within other information, and its counter-technique known as steganalysis.
Publication date: 04 Aug 2008
Document Type: Thesis
 
Image Steganography and Steganalysis

Image Steganography and Steganalysis

Post date: 19 Jul 2010
This paper provides in-depth descriptions of both steganography, the art of hiding information within other information, and its counter-technique known as steganalysis.
Publication date: 04 Aug 2008
Document Type: Thesis


Information Security for Journalists

Post date: 20 Nov 2016
A practical handbook for journalists and investigative reporters in particular. It lays out the most effective means of keeping your work private and safe from spying.
Publisher: Centre for Investigative Journalism (CIJ)
Publication date: 01 May 2016
License: Creative Commons Attribution 4.0 International
Document Type: Book
 
Information Security for Journalists

Information Security for Journalists

Post date: 20 Nov 2016
A practical handbook for journalists and investigative reporters in particular. It lays out the most effective means of keeping your work private and safe from spying.
Publisher: Centre for Investigative Journalism (CIJ)
Publication date: 01 May 2016
License: Creative Commons Attribution 4.0 International Document Type: Book


Introduction to Modern Cryptography

Post date: 23 Sep 2006
This document focuses on modern cryptography as a science. Includes topics on block ciphers, pseudorandom, symmetric and asymmetric encryption, hash, authentication and digital signatures.
Publication date: 11 May 2005
Document Type: Lecture Notes
 
Introduction to Modern Cryptography

Introduction to Modern Cryptography

Post date: 23 Sep 2006
This document focuses on modern cryptography as a science. Includes topics on block ciphers, pseudorandom, symmetric and asymmetric encryption, hash, authentication and digital signatures.
Publication date: 11 May 2005
Document Type: Lecture Notes


Lecture Notes on Cryptography

Post date: 31 Mar 2007
A set of 283 pages lecture notes for a summer course on cryptography, taught by the authors at the Massachusetts Institute of Technology (MIT).
Publication date: 01 Aug 2001
Document Type: Lecture Notes
 
Lecture Notes on Cryptography

Lecture Notes on Cryptography

Post date: 31 Mar 2007
A set of 283 pages lecture notes for a summer course on cryptography, taught by the authors at the Massachusetts Institute of Technology (MIT).
Publication date: 01 Aug 2001
Document Type: Lecture Notes


Math in Society, Edition 2.4

Post date: 10 Dec 2016
This book is an exploration of the wide world of mathematics, with interesting applications to everyday life. It highlights algorithmic, graphical, algebraic, statistical, and analytic approaches to solving problems.
Publication date: 31 Dec 2013
License: Creative Commons Attribution-ShareAlike 3.0 United States
Document Type: Book
 
Math in Society, Edition 2.4

Math in Society, Edition 2.4

Post date: 10 Dec 2016
This book is an exploration of the wide world of mathematics, with interesting applications to everyday life. It highlights algorithmic, graphical, algebraic, statistical, and analytic approaches to solving problems.
Publication date: 31 Dec 2013
License: Creative Commons Attribution-ShareAlike 3.0 United States Document Type: Book


Mathematical Cryptology

Post date: 24 Jul 2016
The notes for the course MAT-52606 Mathematical Cryptology at TUT Finlandia. They contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols.
Publication date: 01 Jan 2014
Document Type: Lecture Notes
 
Mathematical Cryptology

Mathematical Cryptology

Post date: 24 Jul 2016
The notes for the course MAT-52606 Mathematical Cryptology at TUT Finlandia. They contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols.
Publication date: 01 Jan 2014
Document Type: Lecture Notes


Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Publisher: Caxton Business & Legal Inc.
Publication date: 01 Oct 2015
Document Type: Book
 
Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Publisher: Caxton Business & Legal Inc.
Publication date: 01 Oct 2015
Document Type: Book


Open Workbook of Cryptology: A project-based introduction to crypto in Python

Post date: 06 Dec 2021
This is a first draft of a free (as in speech, not as in beer) textbook for a one-semester, undergraduate cryptology course. It was used for CIS 491 at Colorado State University Pueblo in the spring semester of 2021.
Publication date: 15 May 2021
License: Creative Commons Attribution-ShareAlike 4.0 International
Document Type: Textbook
 
Open Workbook of Cryptology: A project-based introduction to crypto in Python

Open Workbook of Cryptology: A project-based introduction to crypto in Python

Post date: 06 Dec 2021
This is a first draft of a free (as in speech, not as in beer) textbook for a one-semester, undergraduate cryptology course. It was used for CIS 491 at Colorado State University Pueblo in the spring semester of 2021.
Publication date: 15 May 2021
License: Creative Commons Attribution-ShareAlike 4.0 International Document Type: Textbook


Practical Cryptography for Developers

Post date: 02 Jan 2022
A modern practical book about cryptography for developers with code examples in Python.
Publication date: 01 Nov 2018
License: The MIT License (MIT)
Document Type: Book
 
Practical Cryptography for Developers

Practical Cryptography for Developers

Post date: 02 Jan 2022
A modern practical book about cryptography for developers with code examples in Python.
Publication date: 01 Nov 2018
License: The MIT License (MIT) Document Type: Book


Privacy on the Line: The Politics of Wiretapping and Encryption

Post date: 15 Nov 2016
This book discusses the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated edition covers recent controversies over NSA spying and other government threats to communications privacy.
Publisher: The MIT Press
Publication date: 01 Feb 2010
License: Standard Copyright License
Document Type: Book
 
Privacy on the Line: The Politics of Wiretapping and Encryption

Privacy on the Line: The Politics of Wiretapping and Encryption

Post date: 15 Nov 2016
This book discusses the social function of privacy, how it underlies a democratic society, and what happens when it is lost. This updated edition covers recent controversies over NSA spying and other government threats to communications privacy.
Publisher: The MIT Press
Publication date: 01 Feb 2010
License: Standard Copyright License Document Type: Book


Rethinking Public Key Infrastructures and Digital Certificates

Post date: 11 Oct 2006
This book proposes highly practical cryptographic building blocks that can be used to design privacy-protecting electronic communication and transaction systems.
Publisher: The MIT Press
Publication date: 01 Aug 2000
Document Type: Book
 
Rethinking Public Key Infrastructures and Digital Certificates

Rethinking Public Key Infrastructures and Digital Certificates

Post date: 11 Oct 2006
This book proposes highly practical cryptographic building blocks that can be used to design privacy-protecting electronic communication and transaction systems.
Publisher: The MIT Press
Publication date: 01 Aug 2000
Document Type: Book


Reverse Engineering for Beginners

Post date: 22 Nov 2016
This book is about the reverse engineering of softwares as in researching compiled programs. Basic understanding of C/C++ is desirable.
Publication date: 19 Nov 2016
License: Creative Commons Attribution-ShareAlike 4.0 International
Document Type: Book
 
Reverse Engineering for Beginners

Reverse Engineering for Beginners

Post date: 22 Nov 2016
This book is about the reverse engineering of softwares as in researching compiled programs. Basic understanding of C/C++ is desirable.
Publication date: 19 Nov 2016
License: Creative Commons Attribution-ShareAlike 4.0 International Document Type: Book


Book Categories
Sponsors