5bdce76b3df40.jpg
PDF
Achieving and Sustaining Secured Business Operations

Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achievi...

5bdb934f9cf3c.jpg
PDF
Cyberspace and Cybersecurity, Second Edition

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates inc...

5bda747e2c1f9.jpg
PDF
Security without Obscurity: A Guide to PKI Operations

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements. While algorithms, certificates, and theoretical policy are all excellent discussions, the real-world issues for operating a commercial or private CA can be overwhelming. Security without Obscurity: A Guide to PKI Operations ...

59fbfcf3bc212.jpg
PDF
Hacking Exposed Wireless, Third Edition

Exploit and defend against the latest wireless network attacks Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you’ll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and...

5966db211ccb3.jpg
PDF
Broadband Quantum Cryptography

Quantum cryptography is a rapidly developing field that draws from a number of disciplines, from quantum optics to information theory to electrical engineering. By combining some fundamental quantum mechanical principles of single photons with various aspects of information theory, quantum cryptography represents a fundamental shift in the basis for security from numerical complexity to the fundamental physical nature of the communic...

595f3007de590.jpg
PDF
Security Solutions and Applied Cryptography in Smart Grid Communications

Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use. Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across ...

595da1539fa0d.jpeg
PDF
Cryptography and Security Services

Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and Applications addresses cryptography from the perspective of the security services and mechanisms av...

595b0313297ec.jpeg
PDF
A Cryptography Primer: Secrets and Promises

Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for ...

595a12ad9dc72.jpeg
PDF
Secret Language: Codes, Tricks, Spies, Thieves, and Symbols

With revelations on every page, and sample codes and puzzles for the reader to crack, Secret Language will entertain everyone with an urge to know more about the most arcane and curious uses of language. From backmasking to the Enigma Machine, from magic words to literary symbols, here is a lively, engaging tour of languages that hide their meanings from all but a chosen few. Blake explains the difference between ciphers and codes an...

595887bd50399.jpg
PDF
Non-Commutative Cryptography and Complexity of Group-Theoretic Problems

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It explores how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public-key cryptography. It also shows that there is remarkable feedback from cryptography to combinatorial group theory because some of th...