free tracker

Practical Cryptography For Data Internetworks

Pub Date : 1996 | Author : William Stallings | Publisher : IEEE Computer Society

ISBN 10 : UOM:39015041378665
ISBN 13 :

A growing proportion of applications and protocols used over the internet either have significant security-related features or have as their primary purpose the provision of some s..


Financial Cryptography And Data Security

Pub Date : 2008-08-17 | Author : Gene Tsudik | Publisher : Springer

ISBN 10 : 9783540852308
ISBN 13 : 3540852301

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel..


Encyclopedia Of Cryptography And Security

Pub Date : 2011-09-06 | Author : Henk C.A. van Tilborg | Publisher : Springer Science & Business Media

ISBN 10 : 9781441959058
ISBN 13 : 144195905X

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive i..


Computer Security And Cryptography

Pub Date : 2007-03-07 | Author : Alan G. Konheim | Publisher : John Wiley & Sons

ISBN 10 : 9780470083970
ISBN 13 : 0470083972

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and imple..



Coding Theory And Cryptography

Pub Date : 2000-08-04 | Author : D.C. Hankerson | Publisher : CRC Press

ISBN 10 : 9780824704650
ISBN 13 : 0824704657

Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, proven by the authors in a popular two-quarter course, presents coding theo..


Practical Intranet Security

Pub Date : 2012-12-06 | Author : Paul M. Ashley | Publisher : Springer Science & Business Media

ISBN 10 : 9781461556091
ISBN 13 : 1461556090

Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be us..