Cryptography

A method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.

All categories

Books under this sub-category (37 books)

Safeguarding Your Technology

Post date: 19 Dec 2007
Written to help educational administrators and staff at the building, campus, district, and state levels better understand why and how to effectively secure their organization's sensitive information, critical systems, and computer equipment.
Publication date: 31 Dec 1998
 
Safeguarding Your Technology

Safeguarding Your Technology

Post date: 19 Dec 2007
Written to help educational administrators and staff at the building, campus, district, and state levels better understand why and how to effectively secure their organization's sensitive information, critical systems, and computer equipment.
Publication date: 31 Dec 1998


Securing Java: Getting Down to Business with Mobile Code

Post date: 24 Oct 2004
Helps the reader to separate fact from fiction when it comes to mobile code security from throughout the entire Java range.
Publisher: John Wiley & Sons
Publication date: 01 Jan 1999
Document Type: Book
 
Securing Java: Getting Down to Business with Mobile Code

Securing Java: Getting Down to Business with Mobile Code

Post date: 24 Oct 2004
Helps the reader to separate fact from fiction when it comes to mobile code security from throughout the entire Java range.
Publisher: John Wiley & Sons
Publication date: 01 Jan 1999
Document Type: Book


Security Engineering - A Guide to Building Dependable Distributed Systems

Post date: 22 Sep 2006
This book gives a solid introduction to security engineering, its underlying technologies (crypto, access control, inference control, tamper resistance, seals) and its important applications in military, medical and financial fields.
Publisher: John Wiley & Sons
Publication date: 01 Jan 2001
Document Type: Book
 
Security Engineering - A Guide to Building Dependable Distributed Systems

Security Engineering - A Guide to Building Dependable Distributed Systems

Post date: 22 Sep 2006
This book gives a solid introduction to security engineering, its underlying technologies (crypto, access control, inference control, tamper resistance, seals) and its important applications in military, medical and financial fields.
Publisher: John Wiley & Sons
Publication date: 01 Jan 2001
Document Type: Book


Ten Strategies of a World-Class Cybersecurity Operations Center

Post date: 23 Oct 2016
Covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments.
Publisher: The MITRE Corporation
Publication date: 31 Dec 2014
Document Type: Book
 
Ten Strategies of a World-Class Cybersecurity Operations Center

Ten Strategies of a World-Class Cybersecurity Operations Center

Post date: 23 Oct 2016
Covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments.
Publisher: The MITRE Corporation
Publication date: 31 Dec 2014
Document Type: Book


The Foundations of Cryptography (Draft)

Post date: 28 Oct 2006
Presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. Focuses on computational difficulty, pseudorandomness and zero-knowledge proofs.
Publisher: Cambridge University Press
Publication date: 18 Jan 2007
Document Type: Book
 
The Foundations of Cryptography (Draft)

The Foundations of Cryptography (Draft)

Post date: 28 Oct 2006
Presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. Focuses on computational difficulty, pseudorandomness and zero-knowledge proofs.
Publisher: Cambridge University Press
Publication date: 18 Jan 2007
Document Type: Book


The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.
Publisher: SysSec
Publication date: 01 Sep 2013
License: Standard Copyright License
Document Type: Book
 
The SysSec Red Book: A Roadmap for Systems Security Research

The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.
Publisher: SysSec
Publication date: 01 Sep 2013
License: Standard Copyright License Document Type: Book


Towards Linguistic Steganography: A Systematic Investigation of Approaches, Systems, and Issues

Post date: 02 May 2008
Designs and constructs steganograms that are more adequate, secure and robust, from a linguistic point of view, than any of the systems built so far.
Publication date: 01 Nov 2004
Document Type: Book
 
Towards Linguistic Steganography: A Systematic Investigation of Approaches, Systems, and Issues

Towards Linguistic Steganography: A Systematic Investigation of Approaches, Systems, and Issues

Post date: 02 May 2008
Designs and constructs steganograms that are more adequate, secure and robust, from a linguistic point of view, than any of the systems built so far.
Publication date: 01 Nov 2004
Document Type: Book


Book Categories
Sponsors