Listing 1 - 8 of 8 |
Sort by
|
Choose an application
004.056.55 --- cryptografie --- encryptie --- netwerkbeveiliging --- netwerken --- veiligheid computers --- data-encryptie
Choose an application
Cryptage des données (Ordinatique) --- Data encryption (Computer science) --- Data-encryptie (Computerleer) --- Data-encryptie (Computerwetenschap) --- Business enterprises --- Electronic funds transfers --- Internet --- World Wide Web (Information retrieval system) --- Chiffrement (Informatique) --- World Wide Web --- Computer networks --- Security measures --- Sécurité --- Mesures --- Sûreté --- Security measures. --- Sécurité --- Sûreté --- Business enterprises - Computer networks - Security measures. --- Internet (Computer network) - Security measures. --- World Wide Web (Information retrieval system) - Security measures.
Choose an application
Chiffrement --- Codes secrets --- Correspondance secrète --- Cryptage --- Cryptage des données (Ordinatique) --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Data encryption (Computer science) --- Data-encryptie (Computerleer) --- Data-encryptie (Computerwetenschap) --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Écriture cryptographique --- Écriture secrète --- Credit cards --- Electronic funds transfers --- Cartes de crédit --- Monnaie électronique --- Data processing --- Informatique --- Cartes de crédit --- Monnaie électronique --- Electronic funds transfers.
Choose an application
Cryptage des données (Ordinatique) --- Data encryption (Computer science) --- Data-encryptie (Computerleer) --- Data-encryptie (Computerwetenschap) --- Internet --- Chiffrement (Informatique) --- Security measures --- Sécurité --- Mesures --- 681.3*E3 --- computernetwerken --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Security measures. --- Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption (Computer science). --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Sécurité
Choose an application
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft® .NET security, and Microsoft ActiveX® development, plus practical checklists for developers, testers, and program managers.
Computer security --- Data encryption (Computer science) --- Sécurité informatique --- Chiffrement (Informatique) --- Computerbeveiliging --- Data encryptie --- Computernetwerken --- Netwerkbeveiliging --- Programmeren --- codes --- veiligheid --- software --- Computernetwerken. --- Netwerkbeveiliging. --- Programmeren. --- Computer security. --- Sécurité informatique --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success. The material includes four important features: ASIC and FPGA hardware design for cryptography, Principles and practice of true random number generators, Detailed algorithmic treatment of public-key cryptographic systems and emphasis on the engineering of systems, and Side-channel attacks on cryptographic systems and countermeasure designs. Cryptographic Engineering is a comprehensive text that is suitable as a handbook for hardware and software engineers who are interested in building secure systems using cryptographic techniques.
cryptologie --- elektrische circuits --- Information systems --- Electrical engineering --- programmatielogica --- Computer science --- DES (data encryption standard) --- communicatietechnologie --- Mass communications --- Data encryption (Computer science) --- Embedded computer systems --- Cryptography. --- Chiffrement (Informatique) --- Systèmes enfouis (Informatique) --- Cryptographie --- Design and construction --- Conception et construction --- EPUB-LIV-FT LIVINGEN SPRINGER-B --- Cryptography --- 004.056.55 --- cryptografie --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- data-encryptie
Choose an application
Programming --- cryptografie --- Computer security --- Cryptography --- Telecommunication --- Sécurité informatique --- Cryptographie --- Télécommunications --- Security measures --- Sécurité --- Mesures --- 621.391.7 --- 681.3*E --- -Cryptography --- 384.0 --- 653 --- AA / International- internationaal --- 004.056.55 --- coderen --- computernetwerken --- computerveiligheid --- encryptie --- software --- 005.82 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Secret systems of electrical communication --- Data --- Telecommunicatie: algemeenheden. --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes. --- data-encryptie --- Computer security. --- Cryptography. --- Security measures. --- 681.3*E Data --- 621.391.7 Secret systems of electrical communication --- Cyber security --- Cybersecurity --- Sécurité informatique --- Télécommunications --- Sécurité --- Protection of computer systems --- Protection --- Telecommunicatie: algemeenheden --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes --- Telecommunication - Security measures --- Telecommunication. Security measures
Choose an application
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference. (flaptekst)
Mathematical control systems --- Programming --- Computer science --- Computer security --- Data encryption (Computer science) --- Passwords --- 681.3*E3 --- 681.3*C2 --- 681.3*D46 --- 681.3*K65 --- AES --- Computerbeveiliging --- Data encryptie --- Rijndael --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Passwords. --- Data encryption: data encryption standard; DES; public key cryptosystems --- Computer communication networks: data communications; OSI; security and protection --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Security measures --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption (Computer science). --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 681.3 *C2 --- Computer security. --- Computer communication systems. --- Algorithms. --- Systems and Data Security. --- Cryptology. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing --- Computer security - Passwords
Listing 1 - 8 of 8 |
Sort by
|