Categories Unlimited Books

Crittografia nel Paese delle Meraviglie (UNITEXT / Collana di Informatica) …

In passato, l’arte della “scrittura nascosta” (meglio nota come crittografia) era per lo piu riferita ad un insieme di metodi per nascondere il contenuto di un dato messaggio agli occhi di lettori non autorizzati. Oggi, l’evoluzione dei sistemi digitali ha generato nuovi scenari di comunicazione, richiedendo ai moderni crittografi di progettare crittosistemi che soddisfino requisiti […]

Read More
Categories Unlimited Books

Bitcoin, the Blockchain and Beyond: A 360-Degree onboarding guide to the fi…

Stay tuned for the paper version published in September via www.bitcoinblockchainbook.com. This book takes you on a journey to the future of currency and the blockchain universe. A 360-Degrees onboarding guide Starting from the basics, it moves on to explaining everything you need to know to make up your own mind on the potential, strengths, […]

Read More
Categories Unlimited Books

Fundamentals of Computer Security

This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, […]

Read More
Categories Unlimited Books

Rethinking Public Key Infrastructures and Digital Certificates: Building in…

As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be […]

Read More
Categories Unlimited Books

Building DMZs For Enterprise Networks

This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system […]

Read More
Categories Unlimited Books

Web Application Firewalls

Web Application Firewalls Web applications are not protected by today’s network level firewalls, because they allow access to TCP port 80 without restrictions. However, many successful attacks today are not on the network level, but on application level. For protecting against application level attacks, a firewall must understand the application protocols, that are used on […]

Read More