Subcategories

Efficient Secure Two-Party Protocols: Techniques and Constructions (repost)

Posted By: interes
Efficient Secure Two-Party Protocols: Techniques and Constructions (repost)

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography) by Carmit Hazay and Yehuda Lindell
English | ISBN: 3642143024, 3642265766 | 2011 | 265 pages | PDF | 2,5 MB

Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic T

Posted By: insetes
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic T

Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II By Elisabeth Oswald, Marc Fischlin (eds.)
2015 | 838 Pages | ISBN: 3662468026 | PDF | 14 MB

Number-theoretic Algorithms in Cryptography

Posted By: insetes
Number-theoretic Algorithms in Cryptography

Number-theoretic Algorithms in Cryptography By O. N. Vasilenko
2006 | 248 Pages | ISBN: 0821840908 | PDF | 15 MB

Handbook of Financial Cryptography and Security (repost)

Posted By: interes
Handbook of Financial Cryptography and Security (repost)

Handbook of Financial Cryptography and Security by Burton Rosenberg
English | 2010 | ISBN: 1420059815 | 631 pages | PDF | 16 MB

Blockchain Quick Reference: A guide to exploring decentralized blockchain application development

Posted By: First1
Blockchain Quick Reference: A guide to exploring decentralized blockchain application development

Blockchain Quick Reference: A guide to exploring decentralized blockchain application development by Brenn Hill, Samanyu Chopra, Paul Valencourt
English | September 18th, 2018 | ISBN: 1788995783 | 350 Pages | EPUB (True/HQ) | 15.41 MB

Understand the Blockchain revolution and get to grips with Ethereum, Hyperledger Fabric, and Corda.

Quantum Computing for Computer Scientists

Posted By: ksveta6
Quantum Computing for Computer Scientists

Quantum Computing for Computer Scientists by Noson S. Yanofsky, Mirco A. Mannucci
2008 | ISBN: 0521879965 | English | 402 pages | EPUB | 23 MB

Hands-On Bitcoin Programming with Python: Build powerful online payment centric applications with Python

Posted By: First1
Hands-On Bitcoin Programming with Python: Build powerful online payment centric applications with Python

Hands-On Bitcoin Programming with Python: Build powerful online payment centric applications with Python by Harish Kumar Garg
English | September 18th, 2018 | ISBN: 1789537002 | 90 Pages | EPUB | 2.43 MB

Simplified Python programming for Bitcoin and blockchain

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Posted By: First1
Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Industrial Cybersecurity: Efficiently secure critical infrastructure systems by Pascal Ackerman
English | October 18th, 2017 | ISBN: 1788395158 | 449 Pages | True PDF | 25.61 MB

With industries expanding, cyber attacks have increased significantly. Understanding your control system s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols.

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Posted By: First1
Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Industrial Cybersecurity: Efficiently secure critical infrastructure systems by Pascal Ackerman
English | October 18th, 2017 | ISBN: 1788395158 | 456 Pages | EPUB | 24.91 MB

With industries expanding, cyber attacks have increased significantly. Understanding your control system s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols.

Mastering Bitcoin: A Beginners Guide to Money Investing in Digital Cryptocurrency with Trading, Mining and... [Audiobook]

Posted By: First1
Mastering Bitcoin: A Beginners Guide to Money Investing in Digital Cryptocurrency with Trading, Mining and... [Audiobook]

Mastering Bitcoin: A Beginners Guide to Money Investing in Digital Cryptocurrency with Trading, Mining and Blockchain Technologies Essentials by Michael Scott
English | March 20th, 2018 | ASIN: B07BKMRLDQ | MP3@64 kbps | 37 mins | 17.51 MB
Narrator: Matt Montanez

Bitcoin is digital cash, a type of money put away in an Online "virtual wallet", free from the control of governments or national banks.

Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications (repost)

Posted By: libr
Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications (repost)

Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications by Murray R. Bremner
English | 2011 | ISBN: 1439807027 | 332 pages | PDF | 1,6 MB

Fuzzing for Software Security Testing and Quality Assurance, Second Edition

Posted By: Underaglassmoon
Fuzzing for Software Security Testing and Quality Assurance, Second Edition

Fuzzing for Software Security Testing and Quality Assurance, Second Edition
Artech House | English | 2018 | ISBN-10: 1608078507 | 330 pages | PDF | 24.12 MB

by Ari Takanen;Jared D. Demott;Charles Miller (Author)
This newly revised and expanded second edition of the popular Artech House title, Fuzzing for Software Security Testing and Quality Assurance, provides practical and professional guidance on how and why to integrate fuzzing into the software development lifecycle.

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Posted By: First1
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking by Ric Messier
English | July 17th, 2018 | ISBN: 149202869X | 402 Pages | EPUB (True/HQ) | 18.54 MB

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.

Introduction to Modern Cryptography: Principles and Protocols (repost)

Posted By: interes
Introduction to Modern Cryptography: Principles and Protocols (repost)

Jonathan Katz, Yehuda Lindell, "Introduction to Modern Cryptography: Principles and Protocols"
English | 2007-08-31 | ISBN: 1584885513 | 552 pages | PDF | 37,7 MB

Build Your First Ethereum DApp

Posted By: First1
Build Your First Ethereum DApp

Build Your First Ethereum DApp by Bruno Skvorc
English | August 16th, 2018 | ISBN: 1492069280 | 155 Pages | EPUB (True/HQ) | 3.34 MB

In this book we'll walk through the creation of a complete distributed application (DApp) based on the Ethereum platform. We'll be building The Neverending Story, a crowdsourced choose-your-own-adventure story with crowd curation and community censorship.
SitemapCoppelion (0) | Somebody to Love | Melanie Harlow