Part of the Integrated .NET Series, this book provides a practical and comprehensive treatment on implementing both cryptography and security features on the .NET platform - using the C# and VB .NET programming languages. It provides focused and detailed code examples that demonstrate the most important concepts, with commentary on how the code examples work. The book also provides a substantia…
"Novel ini berkisah tentang pergulatan para filsuf dalam bertanya, berdebat, dan merenung pelbagai jawaban kehidupan. Cara berkisah novel ini sungguh memikat dan pasti membuat pembaca awam semakin 'kepincut' untuk membacanya tanpa jeda. Dunia Sophie adalah pengantar ke dunia filsafat yang paling menarik karena disajikan dalam bentuk cerita setengah detektif. Seru, tegang, mendebarkan, namun men…
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems. Leading experts have joined forces for the …
Terdapat bibliografi dan indeks. Table of Contents Part I Programming in PL/SQL Chapter 1 Introduction to PL/SQL What Is PL/SQL? The Origins of PL/SQL So This Is PL/SQL About PL/SQL Versions Resources for PL/SQL Developers Some Words of Advice Chapter 2 Creating and Running PL/SQL Code Navigating the Database Creating and Editing Source Code SQL*Plus Performi…
Terdapat indeks. Table of contents: 1 Anonymizing Your Activities 2 Honeypots 3 Malware Classification 4 Sandboxes and Multi-AV Scanners 5 Researching Domains and IP Addresses 6 Documents, Shellcode, and URLs 7 Malware Labs 8 Automation 9 Dynamic Analysis 10 Malware Forensics 11 Debugging Malware 12 De-Obfuscation 13 Working with DLLs 14 Kernel Debugging 15 Memor…
Contents Part One: Introduction Chapter 1. Overview of Databases and Transactions 1.1. What are Databases and Transactions? 1.2. Features of Modern Databases and Transactions Processing Systems 1.3. Major Players in the Implementation and Support of Databases and Transactions Processing Systems 1.4. Decision Support Systems - OLAP and OLTP Chapter 2. The Big Picture 2.1. Case Study:…
Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.
Contents: -- An introduction to cryptography -- Discrete logarithms and Diffie-Hellman -- Integer factorization and RSA -- Combinatorics, probability, and information theory -- Elliptic curves and cryptography -- Lattices and cryptography -- Digital signatures -- Additional topics in cryptography.
Table of contens: CHAPTER 1. INFORMATION SYSTEMS AND DIGITAL TECHNOLOGY 1 1.1. The concept of information systems 1 1.2. History of the concept of information systems 5 1.2.1. The centralized processing stage (1950s–1960s) 5 1.2.2. The data decentralization stage (1970s–1990s) 6 1.2.3. The interoperability and standardization stage (1990s) 6 1.2.4. The universality and globalization …
Contents 1 Introduction 2 Cryptography basics 3 PKI building blocks 4 PKI management and security 5 PKI roles and responsibilities 6 Security considerations 7 Operational considerations 8 Incident management 9 PKI governance, risk, and compliance 10 Advanced PKI