Subcategories
https://initiativeq.com/invite/rI_mqXPIQ
Initiative Q is reserving Q currency for people who join today

The earlier you join the more Q you can reserve!
Think of it as getting free bitcoin seven years ago.

Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications (repost)

Posted By: libr
Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications (repost)

Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications by Murray R. Bremner
English | 2011 | ISBN: 1439807027 | 332 pages | PDF | 1,6 MB

Fuzzing for Software Security Testing and Quality Assurance, Second Edition

Posted By: Underaglassmoon
Fuzzing for Software Security Testing and Quality Assurance, Second Edition

Fuzzing for Software Security Testing and Quality Assurance, Second Edition
Artech House | English | 2018 | ISBN-10: 1608078507 | 330 pages | PDF | 24.12 MB

by Ari Takanen;Jared D. Demott;Charles Miller (Author)
This newly revised and expanded second edition of the popular Artech House title, Fuzzing for Software Security Testing and Quality Assurance, provides practical and professional guidance on how and why to integrate fuzzing into the software development lifecycle.

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Posted By: First1
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking by Ric Messier
English | July 17th, 2018 | ISBN: 149202869X | 402 Pages | EPUB (True/HQ) | 18.54 MB

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.

Introduction to Modern Cryptography: Principles and Protocols (repost)

Posted By: interes
Introduction to Modern Cryptography: Principles and Protocols (repost)

Jonathan Katz, Yehuda Lindell, "Introduction to Modern Cryptography: Principles and Protocols"
English | 2007-08-31 | ISBN: 1584885513 | 552 pages | PDF | 37,7 MB

Build Your First Ethereum DApp

Posted By: First1
Build Your First Ethereum DApp

Build Your First Ethereum DApp by Bruno Skvorc
English | August 16th, 2018 | ISBN: 1492069280 | 155 Pages | EPUB (True/HQ) | 3.34 MB

In this book we'll walk through the creation of a complete distributed application (DApp) based on the Ethereum platform. We'll be building The Neverending Story, a crowdsourced choose-your-own-adventure story with crowd curation and community censorship.

Ethereum: Tools & Skills

Posted By: First1
Ethereum: Tools & Skills

Ethereum: Tools & Skills Bruno Skvorc, Ahmed Bouchefra, Mislav Javor, Tonino Jankov
English | August 16th, 2018 | ISBN: 1492069248 | 146 Pages | EPUB (True/HQ) | 2.63 MB

As the Ethereum platform has grown, so has the ecosystem of tools that support it. In this book, we'll examine some of the most popular Ethereum tools, and walk you through how to use them when building your own Ethereum-based apps.

The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption (Repost)

Posted By: step778
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption (Repost)

Joshua Holden, "The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption"
2017 | pages: 378 | ISBN: 0691141754 | PDF | 2,7 mb

The code book : the science of secrecy from ancient Egypt to quantum cryptography

Posted By: insetes
The code book : the science of secrecy from ancient Egypt to quantum cryptography

The code book : the science of secrecy from ancient Egypt to quantum cryptography By Singh, Simon
2000 | 411 Pages | ISBN: 0307787842 | EPUB | 6 MB

Blockchain and the Law: The Rule of Code [Audiobook]

Posted By: First1
Blockchain and the Law: The Rule of Code [Audiobook]

Blockchain and the Law: The Rule of Code [Audiobook] by Primavera De Filippi, Aaron Wright
English | August 21st, 2018 | ASIN: B07G3DY6GF | MP3@64 kbps | 8 hrs 55 mins | 193.79 MB
Narrator: Teri Schnaubelt

Since Bitcoin appeared in 2009, the digital currency has been hailed as an Internet marvel and decried as the preferred transaction vehicle for all manner of criminals. It has left nearly everyone without a computer-science degree confused: Just how do you "mine" money from ones and zeros?

Introduction to modern cryptography

Posted By: insetes
Introduction to modern cryptography

Introduction to modern cryptography By Katz, Jonathan; Lindell, Yehuda
2014 | 583 Pages | ISBN: 146657027X | PDF | 7 MB

Advances in Cryptology -- CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 20

Posted By: insetes
Advances in Cryptology -- CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 20

Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III By Matthew Robshaw, Jonathan Katz
2016 | 651 Pages | ISBN: 3662530147 | PDF | 11 MB

Public-key cryptography and computational number theory : proceedings of the international conference organized by the Stefan B

Posted By: insetes
Public-key cryptography and computational number theory : proceedings of the international conference organized by the Stefan B

Public-key cryptography and computational number theory : proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000 By Kazimierz Alster, Jerzy Urbanowicz, Hugh C. Williams, Kazimierz Alster, Jerzy Urbanowicz, Hugh C. Williams (eds.)
2001 | 331 Pages | ISBN: 3110170469 | DJVU | 5 MB

Finite Fields: Theory and Computation: The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography

Posted By: insetes
Finite Fields: Theory and Computation: The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography

Finite Fields: Theory and Computation: The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography By Shparlinski, Igor E
1999 | 528 Pages | ISBN: 9048152038 | DJVU | 5 MB

Advances in Cryptology CRYPTO 2016 36th Annual International Cryptology Conference, Proceedings , Part 1

Posted By: insetes
Advances in Cryptology CRYPTO 2016 36th Annual International Cryptology Conference, Proceedings , Part 1

Advances in Cryptology CRYPTO 2016 36th Annual International Cryptology Conference, Proceedings , Part 1 By Matthew Robshaw, Jonathan Katz
2016 | 685 Pages | ISBN: 3662530171 | PDF | 10 MB

Advances in cryptology - CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2

Posted By: insetes
Advances in cryptology - CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2

Advances in cryptology - CRYPTO 2016 : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016 : Proceedings, Part 2 By Matthew Robshaw, Jonathan Katz
2016 | 703 Pages | ISBN: 3662530074 | PDF | 9 MB