595b0313297ec.jpeg
PDF
A Cryptography Primer: Secrets and Promises

Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for ...

595a12ad9dc72.jpeg
PDF
Secret Language: Codes, Tricks, Spies, Thieves, and Symbols

With revelations on every page, and sample codes and puzzles for the reader to crack, Secret Language will entertain everyone with an urge to know more about the most arcane and curious uses of language. From backmasking to the Enigma Machine, from magic words to literary symbols, here is a lively, engaging tour of languages that hide their meanings from all but a chosen few. Blake explains the difference between ciphers and codes an...

595887bd50399.jpg
PDF
Non-Commutative Cryptography and Complexity of Group-Theoretic Problems

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It explores how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public-key cryptography. It also shows that there is remarkable feedback from cryptography to combinatorial group theory because some of th...

5955cf4ac75e5.jpeg
PDF
Cryptography: An Introduction, 3rd Edition

Nigel Smart's "Cryptography" provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.

595488afe20be.jpg
PDF
CompTIA Security+ All-in-One Exam Guide

Get complete coverage of all objectives included on the latest release of the CompTIA Security+ exam from this comprehensive resource. Cowritten by leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help yo...

59536b0eb1769.jpg
PDF
Soil and Water Conservation Merit Badge Series

Merit Badge Pamphlets: An official Boy Scout merit badge pamphlet has been created for the BSA by topic authorities for each merit badge. The pamphlets contain requirements, introductory information and supplemental reference text. A scout can purchase pamphlets from BSA, find them in a troop library, or often-times check them out from a public library. There is also a Requirements Booklet with a merit badge list for quick reference....

59536b0ccc8f6.jpg
PDF
Complexity and Cryptography

Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics.

5950ca7cda925.jpeg
PDF
Kryptologie

Dieses Lehrbuch bietet einen fundierten Überblick über manche klassische hin zu modernen bis zu brandaktuellen kryptografischen Verfahren. Die Voraussetzungen, die ein Leser mitbringen sollte, konzentrieren sich auf wenige Inhalte der linearen Algebra und Analysis, die im ersten Studienjahr vermittelt werden. Das Buch umfasst im Wesentlichen einen Themenkreis, der in einer vierstündigen Vorlesung angesprochen werden kann. Es zeichnet...

5950ca7acf51a.jpg
PDF
Foundations of Cryptography Volume II Basic Applications

Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptograph...

002fd8f0_medium
PDF
Cryptography Engineering: Design Principles & Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll le...