Environmental Science for a Changing World (2nd Edition)

This book, Scientific American Environment Science for a Changing World, has been one of the most informative, enlightening, eye opening, mouth dropping, reading experiences in my life. This is not an exaggeration by any means. So much has been done to 'our' planet with unintentional, yet disregarded results. Many of the inhabitants who live here on Earth suffer dearly while others go about their happy go lucky lifestyles without a c...

Serious Cryptography: A Practical Introduction to Modern Encryption

Just what I was looking for, addresses most common crypto algorithms and points to weaknesses or ways how it can be weakened. Great for people planning to use or implement crypto libraries Philosopher Alfred North Whitehead noted that modern philosophy is simply a series of footnotes to Plato. When it comes to cryptography, much of it is simply footnotes to Bruce Schneier’s classic work Applied Cryptography: Protocols, Algorithms and...

Network Security and Cryptography : A Self-Teaching Introduction

Network Security and Cryptography covers the basic concepts of computer networks as they relate to cryptography and network security, and is recommended both for computer and network engineers and those who would survey the latest material relating to soft grids, big data analytics, blockchain, and computer network ciphers. Chapters include mathematical equations and support for this overview of cryptography and its applications in r...

Algorithmic Strategies for Solving Complex Problems in Cryptography

Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Algorithmic Strategies for Solving Complex Problems in Cryptography is an essential reference source that discusses the evolution and current trends in cryptology, and it offers...

Modern Cryptography and Elliptic Curves : A Beginner's Guide

The main objective of this book, which is mainly aimed at undergraduate students, is to explain the arithmetic of elliptic curves defined over finite fields and to show how those curves can be used in cryptography. In order to do that, the author purposely avoids complex mathematical demonstrations and, instead, presents the concepts in a more descriptive way, suggesting some topics for further exploration by the reader. --Victor Gay...

L'univers secret de la cryptographie

Présente dès l Antiquité à des fins militaires et diplomatiques, la cryptographie s illustre aujourd hui, à l ère du numérique, dans des usages plus pacifiques. Elle permet en effet de sécuriser toutes les opérations de la vie courante, des systèmes informatiques aux télécommunications en passant par les transactions bancaires. Pour mesurer l étendue de ses applications et apprendre à s en servir, Gilles Dubertret nous fait découvrir...

Cryptography and Network Security: Principles and Practice, International Edition
Cryptography and Network Security

I like the clarity of the prose, the use of examples, the systematic organization and the use of figures that enable the reader to check their understanding. I do not understand the negative reviews that complain about poor editing or the use of nested examples. In the first four chapters, and Appendix G, I have not found any errors or garbled text. In general, I am reading for an overview but, for example in the section on number th...

Cybercrime in Progress: (Crime Science Series)

The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways. Criminological scholarship on these issues has increased dramatically over the last decade, as have studies on ways to prevent and police these offenses. This book is one of the first texts to provide a comprehensive review of research regarding cybercrime, policing and enfo...

Cryptography: A Very Short Introduction

This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book ...

RSA and Public-Key Cryptography

Although much literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent developments in the area at an accessible level. Acclaimed author Richard A. Mollin brings together all of the relevant information available on public-key cryptography (PKC), from RSA to the latest applications of PKC, including electronic cash, secret broadcasting, secret balloting systems...