Subcategories

Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings

Posted By: insetes
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings

Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings By Sherman S. M. Chow, Joseph K. Liu, Lucas C. K. Hui, Siu Ming Yiu (eds.)
2014 | 351 Pages | ISBN: 3319124749 | PDF | 5 MB

Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proce

Posted By: insetes
Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proce

Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings By Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis (eds.)
2014 | 401 Pages | ISBN: 3319122797 | PDF | 7 MB

Mastering Ethereum: Building Smart Contracts and DApps

Posted By: ksveta6
Mastering Ethereum: Building Smart Contracts and DApps

Mastering Ethereum: Building Smart Contracts and DApps by Andreas M. Antonopoulos, Gavin Wood Ph. D.
2018 | ISBN: 1491971940 | English | 424 pages | EPUB | 3 MB

The Modern C# Challenge: Become an expert C# programmer by solving interesting programming problems

Posted By: ksveta6
The Modern C# Challenge: Become an expert C# programmer by solving interesting programming problems

The Modern C# Challenge: Become an expert C# programmer by solving interesting programming problems by Rod Stephens
2018 | ISBN: 1789535425 | English | 362 pages | PDF | 8 MB

Topics in Cryptology - CT-RSA 2010

Posted By: step778
Topics in Cryptology - CT-RSA 2010

Josef Pieprzyk, "Topics in Cryptology - CT-RSA 2010"
2010 | pages: 406 | ISBN: 3642119247 | PDF | 5,0 mb

Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part

Posted By: insetes
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part

Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II By Yevgeniy Dodis, Jesper Buus Nielsen (eds.)
2015 | 700 Pages | ISBN: 3662464969 | PDF | 8 MB

A classical introduction to cryptography exercise book (Repost)

Posted By: insetes
A classical introduction to cryptography exercise book (Repost)

A classical introduction to cryptography exercise book By Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, Serge Vaudenay
2006 | 254 Pages | ISBN: 0387279342 | PDF | 30 MB

Internet of Things Security : Fundamentals, Techniques and Applications

Posted By: readerXXI
Internet of Things Security : Fundamentals, Techniques and Applications

Internet of Things Security : Fundamentals, Techniques and Applications
by Shishir Kumar Shandilya and Soon Ae Chun
English | 2018 | ISBN: 8793609531 | 164 Pages | PDF | 8.34 MB

A Graduate Course in Applied Cryptography

Posted By: arundhati
A Graduate Course in Applied Cryptography

Dan Boneh, Victor Shoup, "A Graduate Course in Applied Cryptography"
2017 | e-book | ISBN-10: N/A | 832 pages | PDF | 25 MB

Théorie des codes: Compression, cryptage, correction (repost)

Posted By: interes
Théorie des codes: Compression, cryptage, correction (repost)

Jean-Guillaume Dumas, Jean-Louis Roch, Eric Tannier et Sébastien Varrette, "Théorie des codes: Compression, cryptage, correction"
French | 2006 | ISBN: 2100506927 | 352 pages | PDF | 3,5 MB

Preventing Ransomware: Understand, prevent, and remediate ransomware attacks

Posted By: First1
Preventing Ransomware: Understand, prevent, and remediate ransomware attacks

Preventing Ransomware: Understand, prevent, and remediate ransomware attacks by Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan
English | March 28th, 2018 | ISBN: 1788620607 | 268 Pages | EPUB | 11.70 MB

Your one-stop guide to know digital extortion and it's prevention.

Cryptography : Theory and Practice, Fourth Edition

Posted By: readerXXI
Cryptography : Theory and Practice, Fourth Edition

Cryptography : Theory and Practice, Fourth Edition
by Douglas R. Stinson and Maura B. Paterson
English | 2018 | ISBN: 1138197017 | 599 Pages | PDF | 23 MB

Visual cryptography and secret image sharing (Repost)

Posted By: insetes
Visual cryptography and secret image sharing (Repost)

Visual cryptography and secret image sharing By Cimato, Stelvio; Yang, Ching-Nung (eds)
2012 | 501 Pages | ISBN: 143983721X | PDF | 9 MB

Learn Red – Fundamentals of Red: Get up and running with the Red language for full-stack development

Posted By: First1
Learn Red – Fundamentals of Red: Get up and running with the Red language for full-stack development

Learn Red – Fundamentals of Red: Get up and running with the Red language for full-stack development by Ivo Balbaert
English | June 18th, 2018 | ISBN: 1789130700 | 252 Pages | EPUB | 2.13 MB

Discover how to use the next-generation language Red for full-stack development, from systems coding over user-interfaces to blockchain programming

Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Posted By: First1
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues by José Manuel Ortega
English | October 9th, 2018 | ISBN: 1788992512 | 428 Pages | EPUB | 24.29 MB

Master Python scripting to build a network and perform security operations