Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
004.056.55 --- cryptografie --- encryptie --- netwerkbeveiliging --- netwerken --- veiligheid computers --- data-encryptie
Choose an application
Cryptage des données (Ordinatique) --- Data encryption (Computer science) --- Data-encryptie (Computerleer) --- Data-encryptie (Computerwetenschap) --- Business enterprises --- Electronic funds transfers --- Internet --- World Wide Web (Information retrieval system) --- Chiffrement (Informatique) --- World Wide Web --- Computer networks --- Security measures --- Sécurité --- Mesures --- Sûreté --- Security measures. --- Sécurité --- Sûreté --- Business enterprises - Computer networks - Security measures. --- Internet (Computer network) - Security measures. --- World Wide Web (Information retrieval system) - Security measures.
Choose an application
Information systems --- Computer. Automation --- digitalisering --- informatisering --- digitale fotocamera --- digitale muziek --- datacommunicatie --- telecommunicatie --- digitale video --- digitale techniek --- binaire code --- datacompressie --- encryptie algoritme --- internet --- beeldverwerking (image processing) --- (zie ook: digitale camera) --- (zie ook: fototoestel) --- (zie ook: telecommunicatie)
Choose an application
Chiffrement --- Codes secrets --- Correspondance secrète --- Cryptage --- Cryptage des données (Ordinatique) --- Cryptanalyse --- Cryptanalysis --- Cryptografie --- Cryptographie --- Cryptography --- Cryptologie --- Cryptology --- Data encryption (Computer science) --- Data-encryptie (Computerleer) --- Data-encryptie (Computerwetenschap) --- Déchiffrement --- Décodage --- Décryptage --- Décryptement --- Lettres secrètes --- Messages cryptographiques --- Secret codes --- Secret writing --- Steganography --- Stéganographie --- Écriture cryptographique --- Écriture secrète --- Credit cards --- Electronic funds transfers --- Cartes de crédit --- Monnaie électronique --- Data processing --- Informatique --- Cartes de crédit --- Monnaie électronique --- Electronic funds transfers.
Choose an application
Cryptage des données (Ordinatique) --- Data encryption (Computer science) --- Data-encryptie (Computerleer) --- Data-encryptie (Computerwetenschap) --- Internet --- Chiffrement (Informatique) --- Security measures --- Sécurité --- Mesures --- 681.3*E3 --- computernetwerken --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Security measures. --- Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption (Computer science). --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Sécurité
Choose an application
Programming --- cryptografie --- Computer security --- Cryptography --- Telecommunication --- Sécurité informatique --- Cryptographie --- Télécommunications --- Security measures --- Sécurité --- Mesures --- 621.391.7 --- 681.3*E --- -Cryptography --- 384.0 --- 653 --- AA / International- internationaal --- 004.056.55 --- coderen --- computernetwerken --- computerveiligheid --- encryptie --- software --- 005.82 --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Secret systems of electrical communication --- Data --- Telecommunicatie: algemeenheden. --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes. --- data-encryptie --- Computer security. --- Cryptography. --- Security measures. --- 681.3*E Data --- 621.391.7 Secret systems of electrical communication --- Cyber security --- Cybersecurity --- Sécurité informatique --- Télécommunications --- Sécurité --- Protection of computer systems --- Protection --- Telecommunicatie: algemeenheden --- Handelscorrespondentie : briefwisseling, fax en e-mailverkeer. Telefoon- en telegraafcodes --- Telecommunication - Security measures --- Telecommunication. Security measures
Choose an application
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft® .NET security, and Microsoft ActiveX® development, plus practical checklists for developers, testers, and program managers.
Computer security --- Data encryption (Computer science) --- Sécurité informatique --- Chiffrement (Informatique) --- Computerbeveiliging --- Data encryptie --- Computernetwerken --- Netwerkbeveiliging --- Programmeren --- codes --- veiligheid --- software --- Computernetwerken. --- Netwerkbeveiliging. --- Programmeren. --- Computer security. --- Sécurité informatique --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success. The material includes four important features: ASIC and FPGA hardware design for cryptography, Principles and practice of true random number generators, Detailed algorithmic treatment of public-key cryptographic systems and emphasis on the engineering of systems, and Side-channel attacks on cryptographic systems and countermeasure designs. Cryptographic Engineering is a comprehensive text that is suitable as a handbook for hardware and software engineers who are interested in building secure systems using cryptographic techniques.
cryptologie --- elektrische circuits --- Information systems --- Electrical engineering --- programmatielogica --- Computer science --- DES (data encryption standard) --- communicatietechnologie --- Mass communications --- Data encryption (Computer science) --- Embedded computer systems --- Cryptography. --- Chiffrement (Informatique) --- Systèmes enfouis (Informatique) --- Cryptographie --- Design and construction --- Conception et construction --- EPUB-LIV-FT LIVINGEN SPRINGER-B --- Cryptography --- 004.056.55 --- cryptografie --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- data-encryptie
Choose an application
The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, the use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background information about these developments and explains how to understand and properly evaluate them. The book is set up for use in interdisciplinary educational programmes. Each chapter provides a structured analysis of the role of privacy within that discipline, its characteristics, themes and debates, as well as current challenges. Disciplinary approaches are presented in such a way that students and researchers from every scientific background can follow the argumentation and enrich their own understanding of privacy issues.
86.52 civil rights. --- Datenschutz. --- Electronic surveillance. --- Privacy, Right of. --- Cybercrime --- Privacy --- Encryptie --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Law and legislation --- Privacy, Personal Information, Data Driven Technologies, Interdisciplinary, Education,.
Choose an application
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications. The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols. "Network Security with OpenSSL" enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library's advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges. As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to useOpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included. OpenSSL may well answer your need to protect sensitive data. If that's the case, "Network Security with OpenSSL" is the only guide available on the subject.
cryptografie --- netwerkbeheer --- SSL (secure sockets layer) --- Computer architecture. Operating systems --- computerbeveiliging --- Computer networks --- Computer network protocols --- Réseaux d'ordinateurs --- Protocoles de réseaux d'ordinateurs --- Security measures --- Sécurité --- Mesures --- OpenSSL --- 681.3*C2m --- 681.3*E3 --- Computer network protocols. --- dsa --- encryptie algoritme --- interface --- internetbeveiliging --- mac (multiplexed analogue components) --- netwerkmanagement --- openssl --- Protocols, Computer network --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer communication networks: data communications; OSI; security and protection --- Data encryption: data encryption standard; DES; public key cryptosystems --- Security measures. --- OpenSSL. --- Open secure socket layer --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*C2m Computer communication networks: data communications; OSI; security and protection --- Computer networks - Security measures
Listing 1 - 10 of 11 | << page >> |
Sort by
|