Книги жанра зарубежная компьютерная литература: скачать бесплатно или читать онлайн в электронной библиотеке Fantasy Worlds Страница 76
Вы не авторизовались
Войти
Зарегистрироваться

Книги жанра зарубежная компьютерная литература

Applied Cryptanalysis
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable …

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Cryptology Unlocked
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal s…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Security Patterns
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security Patterns addresses the full spectrum of security in systems design, using best practice solutions to show how to integrate security i…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Internet Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in …

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Internet Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in …

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Internet Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in …

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Internet Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in …

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Information Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the sk…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Information Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the sk…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Information Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the sk…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Information Security
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the sk…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Security Engineering
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error …

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Security Engineering
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error …

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Security Engineering
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error …

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Security Engineering
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error …

Добавленo: Рейтинг: 5 Комментариев 0 шт.