Search Results: 'cryptography'

Search

×
×
×
×
127 results for "cryptography"
America's Jack The Ripper: The Crimes and Psychology of the Zodiac Killer By Søren Roest Korsgaard
Paperback: $19.95
Prints in 3-5 business days
In the 1960s, a full-blown maniac murdered his way onto the front pages of the California newspapers. In his bloodstained letters and phone calls, he proudly commemorated his murderous... More > accomplishments and provided clues to his identity. He called himself the Zodiac. Based on the original police reports and new revealing interviews, this book delves into the mind, methods, and madness of America’s Jack the Ripper.< Less
The Design and Implementation of DSA and DSS By Farrukh Khan
Paperback: $72.20
Prints in 3-5 business days
The proliferation of the internet and the World Wide Web as well as the widespread use of e-commerce has meant that there is a rapidly growing demand for secure electronic business transactions over... More > insecure communication channels. In a digital environment, there is a need to protect information and data from falling into the wrong hands or from being tempered. Protecting information which has been coded in a digital format is the art of cryptography. In the past, public – key cryptosystems such as the Rivest-Shamir-Adleman or the RSA and the Digital Signature Standard or the DSS have been widely used for protecting digital information. The DSS is a component of the United States government’s Capstone program which has attempted to develop cryptography standards for United States government agencies and those private companies that want to do business with this government. This paper presents a method for implementing the DSA and the DSS.< Less
The Design and Implementation of DSA and DSS By Farrukh Khan
eBook (PDF): $37.50
The proliferation of the internet and the World Wide Web as well as the widespread use of e-commerce has meant that there is a rapidly growing demand for secure electronic business transactions over... More > insecure communication channels. In a digital environment, there is a need to protect information and data from falling into the wrong hands or from being tempered. Protecting information which has been coded in a digital format is the art of cryptography. In the past, public – key cryptosystems such as the Rivest-Shamir-Adleman or the RSA and the Digital Signature Standard or the DSS have been widely used for protecting digital information. The DSS is a component of the United States government’s Capstone program which has attempted to develop cryptography standards for United States government agencies and those private companies that want to do business with this government. This paper presents a method for implementing the DSA and the DSS.< Less
Bitcoin: Technical Background and Data Analysis By Federal Reserve Board et al.
Paperback: $16.50
Prints in 3-5 business days
Broadly speaking, Bitcoin is a scheme designed to facilitate the transfer of value be- tween parties. Unlike traditional payment systems, which transfer funds denominated in sovereign currencies,... More > Bitcoin has its own metric for value called bitcoin (with lowercase letter \b", and abbreviated as BTC1). Bitcoin is a complex scheme, and its implementa- tion involves a combination of cryptography, distributed algorithms, and incentive driven behaviour. Moreover, recent developments suggest that Bitcoin operations may involve risks whose nature and proportion are little, if at all, understood. In light of these con- siderations, the purpose of this paper is to provide the necessary technical background to understand basic Bitcoin operations and document a set of empirical regularities related to Bitcoin usage. We present the micro-structure of the Bitcoin transaction process and highlight the use of cryptography for the purposes of transaction security and distributed maintenance of a ledger.< Less
In Secret By Robert W. Chambers
eBook (ePub): $2.51
A wartime romance assembled from a jumble of styles. Miss Evelyn Erith lives in a mansion, has a chauffeur and a butler, has a talent for cryptography and works for the government reading other... More > people's mail. Her boss is becoming interested in her. When the hero arrives the story takes a serious turn into fighting alcoholism. Then a stint at his estate in Scotland, followed by a long grim period fighting the war as secret agents in the forests of neutral Switzerland.< Less
A Brief Introduction to Maple (Second Edition) By Huo Chen
Paperback: $18.00
Prints in 3-5 business days
This is an introductory level book for a mathematics software – Maple. It is designed for readers with no or little experience with Maple, especially for students major in mathematics and... More > engineering. The whole book contains six chapters covering: Maple Basis, Functions and Graphing, Sets, Lists, and Sequences, Vectors and Matrices, Strings and Cryptography, and Basic Maple Programming. Each chapter ends with exercises. Solutions to selected problems are shown at the end of the book.< Less
The Return of Sherlock Holmes By Sir Arthur Conan Doyle
eBook (ePub): $1.37
Having left Sherlock Holmes apparently deceased at the conclusion of The Final Problem (in The Memoirs of Sherlock Holmes), we now find that he is alive after all! In this collection, first published... More > in 1905, the great detective causes Watson to faint (The Empty House), demonstrates that cryptography is elementary (The Dancing Men), and gets engaged (Charles Augustus Milverton). Join in the fun as Holmes deduces his way through these thirteen adventures.< Less
ROCKETPREP CISSP® Concepts 350 Practice Questions: Dominate Your Certification Exam By Mike Spolsky
Paperback: List Price: $20.00 $19.00 | You Save: 5%
Prints in 3-5 business days
Here's what you get in this book: - 350 practice questions covering the breadth of topics under the CISSP® exam, including security engineering,communications and network security, and... More > cryptography - Focus on the most frequently asked interview questions. Avoid information overload - Compact format: easy to read, easy to carry, so you can study on-the-go Now, you finally have what you need to crush your cybersecurity certification, and land that dream job.< Less
JDK Tutorials - Herong's Tutorial Examples By Herong Yang
eBook (ePub): $4.99
This book is a collection of tutorial notes and sample codes written by the author while he was learning JDK (Java Development Kit) core libraries himself. Topics include Time and Calendar,... More > Internationalization, Unnamed Packages, Collections, Character Set and Encoding, Logging, XML related technologies: DOM, SAX, DTD, XSD, and XSL, Cryptography, Certificates, Key stores, Cipher and Encryption, Socket communication, SSL and HTTPS.< Less
JDK Tutorials - Herong's Tutorial Examples By Herong Yang
eBook (PDF): $4.99
This book is a collection of tutorial notes and sample codes written by the author while he was learning JDK (Java Development Kit) core libraries himself. Topics include Time and Calendar,... More > Internationalization, Unnamed Packages, Collections, Character Set and Encoding, Logging, XML related technologies: DOM, SAX, DTD, XSD, and XSL, Cryptography, Certificates, Key stores, Cipher and Encryption, Socket communication, SSL and HTTPS. For latest update, visit http://www.herongyang.com/JDK.< Less

Top 10

see more >
Age Verification Required