intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Encryption

Xem 1-20 trên 514 kết quả Encryption
  • The paper proposes a type of block cipher scheme based on cryptographic hash function and public key cryptography. The scheme proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

    pdf20p vigojek 02-02-2024 0 0   Download

  • AES (Advanced Encryption Standard) was designed by two Belgian cryptographers: Joan Daemen and Vincent Rijmen. AES was recognized as a federal encryption standard by the US National Institute of Standards and Technology on November 26, 2001 and is specified in Federal Information Processing Standard 197 (FIPS 197).

    pdf10p vigrab 02-02-2024 3 2   Download

  • In this book, we cover a wide variety of technologies and show you how to configure those technologies specifically for use in the JBoss Application Server. Naturally, this can’t be done in a vacuum, so we provide simple examples that illustrate the technology and then walk you through the steps necessary to configure things such as deployment descriptors, access control, and encryption. Our intent isn’t to describe every nuance of any particular technology. For that, we recommend that you read books particular to those technologies (and we provide references at the end of most chapters).

    pdf496p longtimenosee02 03-01-2024 2 2   Download

  • Ebook Multimedia forensics & security - Part 2 includes contents: Chapter X: Computational aspects of digital steganography; Chapter XI: On steganalysis and clean image estimation; Chapter XII: Steganalysis: trends and challenges; Chapter XIII: Benchmarking steganalysis; Chapter XIV: Digital camera source identification through JPEG quantisation; Chapter XV: Traitor tracing for multimedia forensics; Chapter XVI: Efficient transparent JPEG2000 encryption.

    pdf234p longtimenosee02 03-01-2024 3 3   Download

  • Ebook Brute force cracking the data encryption standard includes contents: Working Late, Keeping Secrets, Data Encryption Standard, Key Length, Discovery, RSA Crypto Challenges, Congress Takes Note, Supercomputer, Organizing DESCHALL, Needle in a Haystack, Spreading the Word, The Race Is On, Clients, Architecture, Progress, Trouble, Milestones, Gateways, Network, Download, Short Circuit, DESCHALL Community, Proposal,…

    pdf283p haojiubujain010 14-12-2023 3 1   Download

  • Ebook "The art of invisibility" includes content: Your password can be cracked; who else is reading your e-mail; wiretapping 101 if you don’t encrypt, you’re unequipped; now you see me, now you don’t; every mouse click you make, i’ll be watching you; pay up or else; believe everything, trust nothing; you have no privacy, get over it; you can run but not hide; hey, kitt, don’t share my location; the internet of surveillance;... and other contents.

    pdf259p haojiubujain09 30-11-2023 5 4   Download

  • Ebook "How to cheat at VolP security" includes content: The hardware infrastructure, introduction to VolP security, architectures, support protocols, threats to VolP communications systems, confirm user identity, active security monitoring, logically segregate network traffic, IETF encryption solutions for VolP, skype security... and other contents.

    pdf433p haojiubujain09 30-11-2023 5 4   Download

  • Ebook "OS X exploits and defense" includes content: Macintosh OS X boot process and forensic software, past and current threats, malicious macs - malware and the mac, malware detection and the mac, Mac OS X for pen testers, wardriving and wireless penetration testing with OS X, security and OS X, encryption technologies and OS X.

    pdf348p haojiubujain09 30-11-2023 8 4   Download

  • Ebook "How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin" includes content: Presenting the business case for open source software; hardening the operating system; enumeration and scanning your network, introducing intrusion detection and snort; installing and configuring snort and add ons; advanced snort deployment; network analysis, troubleshooting, and packet sniffing; basics of cryptography and encryption; perimeter security, DMZS, remote access, and VPNS; linux bastion hosts; apache web server hardening.

    pdf430p haojiubujain09 30-11-2023 4 4   Download

  • Ebook Cisco network security little black book contains 7 chapters, includes: Chapter 1: Securing the Infrastructure In Brief Immediate Solutions, Chapter 2: AAA security technologies, chapter 3: perimeter router security, Chapter 4: IOS Firewall Feature set, chapter 5: cisco encryption technology, chapter 6: internet protocol security, chapter 7: additional access list features, Appendix A: IOS Firewall IDS Signature List, Appendix B: Securing Ethernet Switches.

    pdf292p haojiubujain09 30-11-2023 6 4   Download

  • Doing the actual math behind modern encryption is admittedly quite difficult, but using the tools that do the work for you isn’t difficult at all once you have a rudimentary understanding of when to use which sort of encryption. PGP & GPG: Email for the Practical Paranoid will take you step by step through the world of encryption and digital signatures and teach you how to use the tools that will allow you to protect your confidential information while sharing it as you desire.

    pdf216p haojiubujain06 23-10-2023 3 3   Download

  • Ebook Practical VoIP Security: Part 2 includes contents: Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP; Chapter 15 Regulatory Compliance; Chapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations.

    pdf302p haojiubujain06 23-10-2023 5 3   Download

  • Ebook Privacy protection and computer forensics (Second edition): Part 1 includes contents: Chapter 8 practical measures for online computer activities, chapter 9 advanced protection from computer data theft online, chapter 10 encryption, chapter 11 practical encryption, chapter 12 link encryption: VPNs, chapter 13 security of wireless connectivity: wifi and bluetooth, chapter 14 other computer-related threats to privacy, chapter 15 biometrics: privacy versus nonrepudiation, chapter 16 legal issues.

    pdf219p haojiubujain06 23-10-2023 5 2   Download

  • Ebook "Securing SQL server" includes content: Identifying security requirements, securing the network, key management, database encryption, SQL password security, securing the instance, analysis services, reporting services, database backup security, storage area network security,... and other contents.

    pdf442p haojiubujain07 20-09-2023 4 4   Download

  • Continued part 1, part 2 of ebook "A graduate course in applied cryptography" develops the concepts of public-key encryption and digital signatures, which allow Alice and Bob to communicate securely, without having a pre-shared secret key. About cryptographic protocols, such as protocols for user identification, key exchange, zero knowledge, and secure computation.

    pdf489p tieulangtran 28-09-2023 4 3   Download

  • Part 1 of ebook "A graduate course in applied cryptography" develops symmetric encryption which explains how two parties, Alice and Bob, can securely exchange information when they have a shared key unknown to the attacker. We discuss data confidentiality, data integrity, and the important concept of authenticated encryption.

    pdf411p tieulangtran 28-09-2023 8 2   Download

  • Continued part 1, part 2 of ebook "A practical guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security" provides readers with contents including: authorizations and sessions; extended authorization (EA) policies; key management; auditing TPM commands; decrypt/encrypt sessions; context management; startup, shutdown, and provisioning; debugging; dolving bigger problems with the TPM 2.0;...

    pdf209p tieulangtran 28-09-2023 4 2   Download

  • Chapter 1- secure communication in modern information societies, chapter 2 - public key cryptography, chapter 3 - symmetric key cryptography, chapter 4 - security protocol design and analysis, chapter 5 - optimal public key encryption with RSA, chapter 6 - analysis of secure information flow.

    pdf297p haojiubujain06 05-09-2023 5 2   Download

  • Ebook Bluetooth security presents the following content: Chapter 1 introduction; chapter 2 overview of the bluetooth security architecture; chapter 3 bluetooth pairing and key management; chapter 4 algorithms; chapter 5 broadcast encryption; chapter 6 security policies and access control; chapter 7 attacks, strengths, and weaknesses; chapter 8 providing anonymity; chapter 9 key management extensions; chapter 10 security for bluetooth applications.

    pdf222p haojiubujain06 05-09-2023 3 1   Download

  • Ebook Computer and information security handbook part 1 includes contents: Part I overview of system and network security: a comprehensive introduction, part II managing information security, part III encryption technology.

    pdf499p haojiubujain06 05-09-2023 4 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2