Catalog Search Results
61) The secret war
Author
Series
World War II volume 29
Publisher
Time-Life Books
Pub. Date
[1981]
Physical Desc
208 pages : illustrations ; 29 cm.
Language
English
Author
Publisher
CRC Press LLC
Pub. Date
[2015]
Physical Desc
1 online resource (xvii, 230 pages) : illustrations
Language
English
Description
"Supplies an introduction to cryptography for those interested in group theory -- Offers formal security analyses and highlights potential vulnerabilities for cryptographic constructions involving group theory -- Provides full proofs of important theorems -- Emphasizes algorithmic aspects -- Includes problems and selected solutions"--
Author
Publisher
John Wiley & Sons, Incorporated
Pub. Date
2019.
Physical Desc
1 online resource (xi, 275 pages) : illustrations, portraits
Language
English
Description
Want Red Team offensive advice from the biggest cybersecurity names in the industry' Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive...
Author
Language
English
Description
Disappearing Cryptography, Second Edition describes how to take words, sounds, or images and hide them in digital data so they look like other words, sounds, or images. When used properly, this powerful technique makes it almost impossible to trace the author and the recipient of a message. Conversations can be submerged in the flow of information through the Internet so that no one can know if a conversation exists at all. This full revision of the...
Author
Publisher
Auerbach Publications
Pub. Date
2012.
Edition
1st edition.
Physical Desc
1 online resource (232 pages)
Language
English
Description
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.Aft.
Author
Language
English
Formats
Description
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There's no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You'll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies....
Author
Publisher
Pegasus Books
Pub. Date
2015.
Edition
First hardcover edition.
Physical Desc
viii, 438 pages, 16 unnumbered pages of plates : illustrations ; 24 cm
Language
English
Description
World War I is often viewed as a war fought by armies of millions living and fighting in trenches, aided by brutal machinery that cost the lives of many. But behind all of this an intellectual war was also being fought between engineers, chemists, code-breakers, physicists, doctors, mathematicians, and intelligence gatherers. This hidden war was to make a positive and lasting contribution to how war was conducted on land, at sea, and in the air, and...
Author
Publisher
Chapman & Hall/CRC
Pub. Date
©2008
Edition
2nd ed.
Physical Desc
1 online resource (xviii, 513 pages) : illustrations
Language
English
Description
Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second Edition develops the theory of elliptic curves to provide a basis for both number theoretic and cryptographic applications. With additional exercises, this edition offers more comprehensive coverage of the fundamental theory, techniques, and applications of elliptic curves. New to the Second Edition - Chapters on isogenies and hyperelliptic curves - A discussion...
Author
Series
Publisher
Wiley
Pub. Date
2020
Physical Desc
1 online resource
Language
English
Description
Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing...
Publisher
CRC Press
Pub. Date
©2015
Physical Desc
1 online resource : illustrations
Language
English
Description
"Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic...
Author
Language
English
Description
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better...
Author
Series
Publisher
O'Reilly
Pub. Date
©1998
Edition
1st ed.
Physical Desc
1 online resource (xvi, 344) : illustrations.
Language
English
Description
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with. This book covers cryptographic...
Author
Publisher
Academic Press
Pub. Date
[2015]
Physical Desc
1 online resource : illustrations (some color)
Language
English
Description
Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications,...
Author
Series
Publisher
Heise
Pub. Date
[2017]
Edition
2., aktualisierte und erweiterte Auflage.
Physical Desc
1 online resource (1 volume) : illustrations
Language
Deutsch
Description
Klaus Schmeh erzählt erstmals die faszinierende Geschichte dieser versteckten Botschaften, die von den alten Griechen und ihren Wachstafeln über Geheimoperationen im Kalten Krieg bis zu den Computerhackern der Gegenwart reicht. Er nimmt den Leser mit auf eine furiose Reise durch eine Kulturgeschichte voller Intrigen, Verbrechen und Kriege, in der jedoch auch die Falschspielerei oder der Betrug in der Klassenarbeit eine wichtige Rolle spielen.
Author
Publisher
Wiley-Interscience
Pub. Date
©2007
Physical Desc
1 online resource (xvii, 521 pages) : illustrations
Language
English
Description
Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema.
Author
Language
English
Description
1940. As England prepares to fight the Nazis, three very different women answer the call to Bletchley Park, where the best minds in Britain train to break German military codes. Osla puts her fluent German to use as a translator of decoded enemy secrets. Mab works the legendary codebreaking machines and looks for a socially advantageous husband. Beth's shyness conceals a brilliant facility with puzzles, and she becomes one of the Park's few female...
Author
Language
English
Description
"The entire vast, modern American intelligence system--the amalgam of three-letter spy services of many stripes--can be traced back to the dire straits the world faced at the dawn of World War II. Prior to 1940, the United States had no organization to recruit spies and steal secrets or launch covert campaigns against enemies overseas and just a few codebreakers, isolated in windowless vaults. It was only through Winston Churchill's determination...
Author
Publisher
Packt Publishing
Pub. Date
2021.
Physical Desc
1 online resource
Language
English
Description
Discover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help of examples in JavaScript for Node.js and browsers Key Features Understand how to implement common cryptographic operations in your code with practical examples Learn about picking modern safe algorithms, which libraries you should rely on, and how to use them correctly Build modern and secure applications that respect your...
Interlibrary loan through ILLiad
Didn't find what you need? Items not owned by Knox County Public Library can be requested from other libraries to be delivered to your pickup location.
Suggest a purchase
If it is too new for interlibrary loan (6 months), you can place a suggestion with us. Suggest a Purchase