81
Theory of Cryptography [E-Book] : 21st International Conference, TCC 2023, Taipei, Taiwan, November 29-December 2, 2023, Proceedings, Part IV /
Table of Contents: ...Lattices -- quantum cryptography -- group-based cryptography -- Byzantine agreement, consensus and composability....

Full text 
82
Cybersecurity blue team strategies : uncover the secrets of blue teams to combat cyber threats in your organization [E-Book] /
83
50 algorithms every programmer should know : an unbeatable arsenal of algorithmic solutions for real-world problems [E-Book] /
Table of Contents: ... Algorithms -- Section 3: Advanced Topics -- Chapter 12: Recommendation Engines -- Chapter 13: Algorithmic Strategies for Data Handling -- Chapter 14: Cryptography -- Chapter 15: Large-Scale Algorithms -- Chapter 16: Practical Considerations -- Other Books You May...

Full text 
84
Python for security and networking : leverage python modules and tools in securing your network and applications [E-Book] /
Table of Contents: ..., and Browsers -- 13. Python Tools for Brute-Force Attacks -- 14. Cryptography and Code Obfuscation -- 15. Assessments - Answers to the End-of-Chapter Questions -- Other Books You May Enjoy -- Index....

Full text 
85
CISA - certified information systems auditor study guide. : achieve CISA certification with practical examples and over 850 exam-oriented practice questions [E-Book] /
Table of Contents: ... Resilience -- Chapter 9: Information Asset Security and Control -- Chapter 10: Network Security and Control -- Chapter 11: Public Key Cryptography and Other Emerging Technologies -- Chapter 12: Security Event Management -- Index -- Other Books You May Enjoy....

Full text 
86
Cybersecurity and Identity Access Management [E-Book] /
Table of Contents: ...Cybersecurity for Beginners -- The Basics of Hacking and Penetration Testing -- Hacking for Dummies -- Networking All-in-One for Dummies -- Effective Cyber Security -- Malware -- Firewalls -- Cryptography -- Control physical and logical access to assets...

Full text 
87
Mastering blockchain : a technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs [E-Book] /
Table of Contents: ...Mastering blockchain : a technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs, fourth edition -- Contributors -- Table of Contents -- Preface -- 1. Blockchain 101 -- 2. Decentralization -- 3. Symmetric...

Full text 
88
Learn ethereum : a practical guide to help developers set up and run decentralized applications with ethereum 2.0 [E-Book] /
89
Cloud native software security handbook : unleash the power of cloud native tools for robust security in modern applications [E-Book] /
90
Code-Based Cryptography [E-Book] : 11th International Workshop, CBCrypto 2023, Lyon, France, April 22-23, 2023, Revised Selected Papers /
91
Cryptology and Network Security [E-Book] : 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings /
92
Topics in Cryptology - CT-RSA 2023 [E-Book] : Cryptographers' Track at the RSA Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings /
93
Advanced Network Technologies and Intelligent Computing [E-Book] : Second International Conference, ANTIC 2022, Varanasi, India, December 22-24, 2022, Proceedings, Part I /
94
The Gambler and the Scholars [E-Book] : Herbert Yardley, William & Elizebeth Friedman, and the Birth of Modern American Cryptology /
95
Federated Learning [E-Book] : Fundamentals and Advances /
96
Guide to Cybersecurity in Digital Transformation [E-Book] : Trends, Methods, Technologies, Applications and Best Practices /
97
Mathematical Foundations of Software Engineering [E-Book] : A Practical Guide to Essentials /
98
Security and Risk Analysis for Intelligent Edge Computing [E-Book] /
99
Classical and Modern Cryptography for Beginners [E-Book] /
Table of Contents: ...Chapter 1: An Introduction to Classical And Modern Cryptography -- Chapter 2: Security Standards for Classical and Modern Cryptography -- Chapter-3: Mathematical Foundation for Classical and Modern Cryptography -- Chapter 4: Asymmetric Key Cryptography...

Full text 
100
Advanced Communication and Intelligent Systems [E-Book] : First International Conference, ICACIS 2022, Virtual Event, October 20-21, 2022, Revised Selected Papers /
Table of Contents: ... Tamil Song Lyrics using Machine Learning Algorithms -- AI Based Interactive System-HOMIE -- Factors Influencing Security Issues in Cloud Computing -- Code-Based Cryptography: A Comparative Study of Key Sizes -- Advance Collision Prevention System -- Energy...

Full text