Tags
Language
Tags
March 2024
Su Mo Tu We Th Fr Sa
25 26 27 28 29 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6

Bypassing Memory Encryption

Posted By: eBookRat
Bypassing Memory Encryption

Bypassing Memory Encryption: A Simpler, Non-Technical General Reading for Knowledge Hackers (Ethical Hacking and Penetration Testing)
by Rickbed Nandi, Tapasi Mandal Nandi

English | March 14, 2024 | ASIN: B0CY5LC1F1 | 165 pages | PNG (.rar) | 40 Mb

Database and Application Security: A Practitioner's Guide

Posted By: First1
Database and Application Security: A Practitioner's Guide

Database and Application Security: A Practitioner's Guide by R. Sarma Danturthi
English | March 25th, 2024 | ISBN: 0138073732 | 448 pages | True EPUB | 37.18 MB

An all-encompassing guide to securing your database andapplications against costly cyberattacks!

Cryptographic Shadows

Posted By: eBookRat
Cryptographic Shadows

Cryptographic Shadows
by Carsen Klock

English | February 17, 2024 | ASIN: B0CVVSJZ8B | 56 pages | PNG (.rar) | 16 Mb

Multimedia Security 2: Biometrics, Video Surveillance and Multimedia Encryption

Posted By: hill0
Multimedia Security 2: Biometrics, Video Surveillance and Multimedia Encryption

Multimedia Security 2: Biometrics, Video Surveillance and Multimedia Encryption
English | 2022 | ISBN: 1789450276 | 320 Pages | EPUB (True) | 19 MB

Advances in Communication and Applications

Posted By: AvaxGenius
Advances in Communication and Applications

Advances in Communication and Applications: Proceedings of ERCICA 2023, Volume 2 by N. R. Shetty, N. H. Prasad, H. C. Nagara
English | EPUB (True) | 2024 | 584 Pages | ISBN : 9819976324 | 128.4 MB

This book presents the proceedings of the International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA) 2023. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. Some of the topics include the Internet of Things (IoT), wireless communications, image and video processing, parallel and distributed computing, and smart grid applications, among others. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.
Science Novel Design Discrete Wavelet Transform Wavelets Mathematical Preliminaries Haar Wavelet Methodology Data Collection Python Intelligent Camera Raspberry Algorithms Advanced Algorithms Motivation Haar Cascade Algorithm Cascade Algorithm machine learning Canny Edge Detection Driving Motor Analysis Result Analysis Routing AES Algorithm Power Analysis Power Circuit Components Quantum Gates Circuit Diagram Circuit Simulation Qiskit Qiskit Simulation Data Description Data Extraction Social Network Social Network Measures Visualizing IoT Smart Agriculture COVID-19 Low-Light Images Skin Cancer Detection Deep Learning Metadata Neural Networks Google Net ResNet DDoS DDoS Attacks Cloud Environment Credit Card Fraud Credit Card Fraud Analysis Fraud Analysis Ml Algorithms Logistic Regression KNN Decision Tree Control PID Data Analysis Classification Optimal Solution Deep Learning Techniques Embedded Devices Data Security Cloud Data Security Blockchain Encryption Cloud Computing RSA Algorithm Model Design

Fast Software Encryption

Posted By: AvaxGenius
Fast Software Encryption

Fast Software Encryption: 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers by Matthew Robshaw
English | PDF | 2006 | 443 Pages | ISBN : 3540365974 | 4.3 MB

Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored for the last ?ve years by the International Association for Cryptologic Research (IACR), and previous FSE workshops have been held around the world: 1993 Cambridge, UK 1994 Leuven, Belgium 1996 Cambridge, UK 1997 Haifa, Israel 1998 Paris, France 1999 Rome, Italy 2000 New York, USA 2001 Yokohama, Japan 2002 Leuven, Belgium 2003 Lund, Sweden 2004 New Delhi, India 2005 Paris, France The FSE workshop is devoted to research on fast and secure primitives for symmetric cryptography, including the design and analysis of block ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash fu- tions, and message authentication codes. This year more than 100 papers were submitted to FSE for the ?rst time. After an extensive review by the ProgramCommittee, 27 papers were presented at the workshop. Of course, the programwould not have been complete without the invited speaker, and the presentation by Eli Biham on the early history of di?erential cryptanalysis was particularly appreciated by workshop attendees.

Decentralizing Finance: How DeFi, Digital Assets, and Distributed Ledger Technology Are Transforming Finance

Posted By: First1
Decentralizing Finance: How DeFi, Digital Assets, and Distributed Ledger Technology Are Transforming Finance

Decentralizing Finance: How DeFi, Digital Assets, and Distributed Ledger Technology Are Transforming Finance by Kenneth Bok
English | January 3rd, 2024 | ISBN: 1394154976 | 272 pages | True EPUB | 8.15 MB

A Practitioner's Guide to Decentralized Finance (DeFi), Digital Assets, and Distributed Ledger Technology

Cellular Automata Transforms

Posted By: AvaxGenius
Cellular Automata Transforms

Cellular Automata Transforms: Theory and Applications in Multimedia Compression, Encryption, and Modeling by Olu Lafe
English | PDF | 2000 | 180 Pages | ISBN : 0792378571 | 12.6 MB

Cellular Automata Transforms describes a new approach to using the dynamical system, popularly known as cellular automata (CA), as a tool for conducting transforms on data. Cellular automata have generated a great deal of interest since the early 1960s when John Conway created the `Game of Life'. This book takes a more serious look at CA by describing methods by which information building blocks, called basis functions (or bases), can be generated from the evolving states. These information blocks can then be used to construct any data. A typical dynamical system such as CA tend to involve an infinite possibilities of rules that define the inherent elements, neighborhood size, shape, number of states, and modes of association, etc. To be able to build these building blocks an elegant method had to be developed to address a large subset of these rules. A new formula, which allows for the definition a large subset of possible rules, is described in the book. The robustness of this formula allows searching of the CA rule space in order to develop applications for multimedia compression, data encryption and process modeling.

x86 Software Reverse-Engineering, Cracking, and Counter-Measures (Tech Today)

Posted By: First1
x86 Software Reverse-Engineering, Cracking, and Counter-Measures (Tech Today)

x86 Software Reverse-Engineering, Cracking, and Counter-Measures (Tech Today) by Stephanie Domas, Christopher Domas
English | February 6th, 2024 | ISBN: 1394199880 | 320 pages | True EPUB | 39.46 MB

A crystal-clear and practical blueprint to software disassembly

Advances to Homomorphic and Searchable Encryption

Posted By: hill0
Advances to Homomorphic and Searchable Encryption

Advances to Homomorphic and Searchable Encryption
English | 2023 | ISBN: 3031432134 | 258 Pages | PDF EPUB (True) | 8 MB

Codebreaking: A Practical Guide, Expanded Edition

Posted By: First1
Codebreaking: A Practical Guide, Expanded Edition

Codebreaking: A Practical Guide, Expanded Edition by Elonka Dunin, Klaus Schmeh
English | September 19th, 2023 | ISBN: 1718502729 | 488 pages | True EPUB (Retail Copy) | 48.30 MB

If you liked Dan Brown’s Da Vinci Code—or want to solve similarly baffling cyphers yourself—this is the book for you!

The Hidden History of Code Breaking: The Secret World of Cyphers, Uncrackable Codes, and Elusive Encryptions

Posted By: First1
The Hidden History of Code Breaking: The Secret World of Cyphers, Uncrackable Codes, and Elusive Encryptions

The Hidden History of Code Breaking: The Secret World of Cyphers, Uncrackable Codes, and Elusive Encryptions by Sinclair McKay
English | August 1st, 2023 | ISBN: 163936434X | 400 pages | True EPUB | 11.59 MB

A fascinating exploration of the uncrackable codes and secret cyphers that helped win wars, spark revolutions and change the faces of nations.

Trends in Data Protection and Encryption Technologies

Posted By: hill0
Trends in Data Protection and Encryption Technologies

Trends in Data Protection and Encryption Technologies
English | 2023 | ISBN: 3031333853 | 262 Pages | PDF EPUB (True) | 27 MB

Digital transformation with dataverse

Posted By: First1
Digital transformation with dataverse

Digital transformation with dataverse: Become a citizen developer and lead the digital transformation wave with Microsoft Teams and Power Platform by Aaron Brooke
English | March 3rd, 2022 | ISBN: 8194334446 | 228 pages | True EPUB (Retail Copy) | 8.49 MB

Lead the digital transformation wave with Microsoft Teams

Mira Jago, Verena Zaiser - App-Entwicklung mit Flutter für Dummies

Posted By: Bibliotkaaa
Mira Jago, Verena Zaiser - App-Entwicklung mit Flutter für Dummies

Mira Jago, Verena Zaiser - App-Entwicklung mit Flutter für Dummies
Deutsch | ISBN:‎ 3527840605 | 481 pages | True PDF | 19.5.2023 | 17.77 MB