PDF
Advances in Coding Theory and Crytography

In the new era of technology and advanced communications, coding theory and cryptography play a particularly significant role with a huge amount of research being done in both areas. This book presents some of that research, authored by prominent experts in the field. The book contains articles from a variety of topics most of which are from coding theory. Such topics include codes over order domains, Groebner representation of linea...

PDF
Communication System Security

Helping current and future system designers take a more productive approach in the field,Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes ...

EPUB
Cissp Practice Exams, Third Edition

Great book with good questions. Using the digital tests I got from the E-book, I was able to take and pass the CISSP. One handy thing about it was that the new format questions were included as well, so i was able to see what those were like before I took the test. Oh and when taking the test, take a time out in the middle for a nice bag lunch (packed with love of course) and a short nap. Your mind really will be refreshed after that...

PDF
Practical Cryptography: Algorithms and Implementations Using C++

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and ...

10 Mb
Introduction To Cryptography With Java Applets

Introduction to Cryptography with Java Applets covers the mathematical basis of cryptography and cryptanalysis, like linear diophantine equations, linear congruences, systems of linear congruences, quadratic congruences, and exponential congruences. The chapters present theorems and proofs, and many mathematical examples. Cryptography with Java Applets also covers programming ciphers and cryptanalytic attacks on ciphers. In addition ...

PDF, EPUB
Bulletproof Ssl And Tls: Understanding And Deploying Ssl/tls And Pki To Secure Servers And Web Applications

This book is available in paperback and a variety of digital formats without DRM. Digital version of Bulletproof SSL and TLS can be obtained directly from the author, at feistyduck.com. Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to pro...

PDF
Contemporary Cryptography

Cryptography has become one of the basic enabling technologies of the internet as we know it today. Without the ability to transport such private information as credit card information, none of the commerce oriented sites from Amazon or EBay, none of the porn sites could exist. The net simply wouldn't be as we know it today. Much of the stories that we know of cryptology have to do with the breaking of the German Enigma or the Japane...

PDF
Coding Theory and Cryptology

The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original ...

PDF
Burdens Of Proof: Cryptographic Culture And Evidence Law In The Age Of Electronic Documents

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a d...