Listing 1 - 10 of 17 | << page >> |
Sort by
|
Choose an application
Computer architecture. Operating systems --- 681.3*A0 --- 681.3*C24 --- 681.3*D46 --- General --- Distributed systems: distributed databases; distributed applications; networkoperating systems --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*C24 Distributed systems: distributed databases; distributed applications; networkoperating systems --- 681.3*A0 General
Choose an application
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials. Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks Includes discussion of the liability, safety and privacy implications of hardware and software security and interaction Gives insights on a wide range of security, trust issues and emerging attacks and protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution, straight through to supply chain and deployment in the field A full range of instructor and student support materials can be found on the authors' own website for the book: http://hwsecuritybook.org.
Computer. Automation --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- 681.3*D46 --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems)
Choose an application
The International .4ssociation for Cryptologic Research (1.4CR) organizes tmo - ternational conferences every year, one in Europe and one in the 1-nited States. EUROCRYI’T’88. held in the beautiful environment of the S~isb mountains in Davos, was the sixth European conference. The number of contributions and of participants at the meeting has increased substantiall!.. which is an indication of the high interest in cryptography and system security in general. The interest has not only increased but has also further moved towards - thentication. signatures and other protocols. This is easy to understand in view of the urgent needs for such protocols, in particular in connection with open - formation systems, and in view of the exciting problems in this area. The equally fascinating classical field of secrecy, 2.e. the theory, design and analysis of stream or block ciphers and of public key cryptosystems. was however also well represented and several significant results mere communicated. The present proceedings contain all contributions which were accepted for presentation. The chapters correspond to the sessions at the conference.
cryptografie --- cryptologie --- Information systems --- 681.3*D46 --- 681.3*E3 --- 681.3*H20 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Data encryption: data encryption standard; DES; public key cryptosystems --- Computerwetenschap--?*H20 --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Data encryption (Computer science). --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography
Choose an application
Computer security --- Sécurité informatique --- Congresses --- Congrès --- -681.3*C20 --- 681.3*D46 --- 681.3*H20 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computerwetenschap--?*C20 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computerwetenschap--?*H20 --- Security measures --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Cyber security --- Cybersecurity --- Sécurité informatique --- Congrès --- Protection of computer systems --- Protection --- 681.3*C20 --- 6813*C20 --- Computer security - Congresses
Choose an application
Computer. Automation --- Electronic data processing departments --- Electronic data processing --- Security measures --- -#TCPW:boek --- 681.3*D46 --- 681.3*K4 --- 681.3*K6m --- Computer centers --- ADP (Data processing) --- Automatic data processing --- Data processing --- EDP (Data processing) --- IDP (Data processing) --- Integrated data processing --- Computers --- Office practice --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computerwetenschap--?*K4 --- Insurance; security (Management of computing and information systems) --- Automation --- Electronic data processing. --- Security measures. --- 681.3*K6m Insurance; security (Management of computing and information systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- #TCPW:boek --- Computer department security measures --- Data protection --- Systèmes, Conception de --- System design --- Programmation système (informatique) --- Electronic data processing departments - Security measures
Choose an application
Computer architecture. Operating systems --- #TELE:d.d. Prof. R. Govaerts --- 681.3*C20 --- 681.3*D46 --- 681.3*E3 --- Computerwetenschap--?*C20 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 6813*C20 --- Computer Communication Networks. --- Operating systems (Computers). --- Data encryption (Computer science). --- Telecommunication. --- Operating Systems. --- Cryptology. --- Communications Engineering, Networks. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Operating systems
Choose an application
TCP/IP (transmission control protocol/internet protocol) --- computernetwerken --- Computer. Automation --- computerbeveiliging --- Computer networks --- TCP/IP (Computer network protocol) --- Security measures --- Security measures. --- 681.3*C20 --- 681.3*D46 --- TCP/IP Internet Protocol Suite (Computer network protocol) --- Transmission Control Protocol/Internet Protocol (Computer network protocol) --- Computer network protocols --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer-communication networks: general: data communications, open systems interconnection reference model (OSI), security and protection (e.g., firewalls) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 6813*C20 --- Réseaux d'ordinateurs --- Mesures de sécurité --- Mesures de sécurité. --- Computer networks - Security measures
Choose an application
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details, particularly on the ENIGMA and other rotor machines, on cipher teletype machines, codenamed FISH by the British, and on key negotiation. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransén, International Intelligence History Study Group).
Mathematical control systems --- cryptologie --- 519.764 --- 003.26 --- 091.14:003.26 --- 681.188 --- Computer security --- -Cryptography --- -681.3*D46 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Deciphering of systems of symbols --- Cryptografische schriftsoorten. Geheimschrift --- Codices--Geheimschrift, cryptografie --- Cryptographic devices. Ciphering, encoding machines. Deciphering, decoding machines --- Congresses --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security measures --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.188 Cryptographic devices. Ciphering, encoding machines. Deciphering, decoding machines --- 091.14:003.26 Codices--Geheimschrift, cryptografie --- 003.26 Cryptografische schriftsoorten. Geheimschrift --- 519.764 Deciphering of systems of symbols --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Cryptography --- 681.3*D46 --- Cryptographie --- Data encryption (Computer science). --- Coding theory. --- Information theory. --- Number theory. --- Applied mathematics. --- Engineering mathematics. --- Computers and civilization. --- Cryptology. --- Coding and Information Theory. --- Number Theory. --- Applications of Mathematics. --- Computers and Society. --- Civilization and computers --- Civilization --- Engineering --- Engineering analysis --- Mathematical analysis --- Number study --- Numbers, Theory of --- Algebra --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Mathematics
Choose an application
Computers --- Cryptography --- Access control --- -Cryptography --- -005.82 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- -Computers --- -519.76 --- 621.391.7 --- -681.3*D46 --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Secret systems of electrical communication --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 621.391.7 Secret systems of electrical communication --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Cryptography. --- 519.76 --- 681.3*D46 --- Access control&delete& --- Handbooks, manuals, etc --- Mathematical control systems --- Programming --- cryptografie --- Handbooks, manuals, etc. --- Ordinateurs --- Cryptographie --- Accès --- Contrôle --- Guides, manuels, etc. --- Guides, manuels, etc --- Computers - Access control - Handbooks, manuals, etc. --- Cryptography - Handbooks, manuals, etc.
Choose an application
Computer. Automation --- Electronic data processing departments --- Electronic data processing --- Privacy, Right of --- Security measures --- AA / International- internationaal --- 654 --- -338.043 --- #TCPW P4.0 --- 681.3*C20 --- 681.3*D46 --- 681.3*K4 --- 681.3*K41 --- 681.3*K6m --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Computer centers --- ADP (Data processing) --- Automatic data processing --- Data processing --- EDP (Data processing) --- IDP (Data processing) --- Integrated data processing --- Computers --- Office practice --- Informatieverwerking. Bureautica. --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica. --- Computerwetenschap--?*C20 --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Computerwetenschap--?*K4 --- Computerwetenschap--?*K41 --- Insurance; security (Management of computing and information systems) --- Law and legislation --- Automation --- Electronic data processing. --- Privacy, Right of. --- Security measures. --- 681.3*K6m Insurance; security (Management of computing and information systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 338.043 --- Computer department security measures --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica --- Informatieverwerking. Bureautica --- 6813*C20 --- Persoonlijkheidsrechten. --- Personnalité (Droits de la). --- Information (Traitement automatique de l') (Départements du). Mesures de sûreté. --- Elektronische informatieverwerkingsafdelingen. Zekerheidsmaatregelen. --- Systèmes, Conception de --- System design --- Programmation système (informatique) --- Electronic data processing departments - Security measures
Listing 1 - 10 of 17 | << page >> |
Sort by
|