Subcategories
https://ccrb.io/affiliate/242287
CryptoCarbon - CCRB

The World's Most Innovative Consumer-Oriented
CryptoCurrency due to its unique usability
Flash Token Pre-Sale!

Cryptography and Network Security: Principles and Practice, International Edition

Posted By: Underaglassmoon
Cryptography and Network Security: Principles and Practice, International Edition

Cryptography and Network Security: Principles and Practice, International Edition
Pearson | English | 2014 | ISBN-10: 0273793357 | 758 pages | PDF | 42.88 mb

By William Stallings

Everyday Cryptography: Fundamental Principles and Applications, 2nd Edition

Posted By: arundhati
Everyday Cryptography: Fundamental Principles and Applications, 2nd Edition

Keith Martin, "Everyday Cryptography: Fundamental Principles and Applications, 2nd Edition"
2017 | ISBN-10: 0198788010, 0198788002 | 720 pages | PDF, EPUB | 10 + 4 MB

Online Danger: How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet

Posted By: First1
Online Danger: How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet

Online Danger: How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet by Eric Cole
English | January 12th, 2018 | ASIN: B078WK39TT, ISBN: 1683505336 | 149 pages | EPUB | 3.88 MB

Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don’t require advanced (or even any) technical knowledge. In this book, cyber security expert, Dr. Eric Cole, provides a layman’s look at how to protect yourself online.

Chaos-based Cryptography: Theory, Algorithms and Applications (Repost)

Posted By: step778
Chaos-based Cryptography: Theory, Algorithms and Applications (Repost)

Ljupco Kocarev, Shiguo Lian, "Chaos-based Cryptography: Theory, Algorithms and Applications"
2011 | pages: 408 | ISBN: 3642205410 | PDF | 6,5 mb

Intelligence and Security Informatics [Repost]

Posted By: tanas.olesya
Intelligence and Security Informatics [Repost]

Intelligence and Security Informatics (Lecture Notes in Computer Science / Security and Cryptology) by Hsinchun Chen
English | 3 Apr. 2009 | ISBN: 3642013929 | 180 Pages | PDF | 5 MB

Intelligence and Security Informatics (ISI) is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications.

Theory of Cryptography

Posted By: step778
Theory of Cryptography

Salil P. Vadhan, "Theory of Cryptography"
2007 | pages: 605 | ISBN: 3540709355 | PDF | 8,7 mb

Security and Privacy for Mobile Healthcare Networks (Repost)

Posted By: insetes
Security and Privacy for Mobile Healthcare Networks (Repost)

Security and Privacy for Mobile Healthcare Networks By Kuan Zhang, Xuemin (Sherman) Shen
2015 | 134 Pages | ISBN: 3319247158 | PDF | 3 MB

Security Solutions and Applied Cryptography in Smart Grid Communications

Posted By: Underaglassmoon
Security Solutions and Applied Cryptography in Smart Grid Communications

Security Solutions and Applied Cryptography in Smart Grid Communications
IGI Global | English | 2017 | ISBN-10: 1522518290 | 463 pages | EPUB | 24.49 mb

by Mohamed Amine Ferrag (Editor),‎ Ahmed Ahmim (Editor)

Kryptographie in C und C++: Zahlentheoretische Grundlagen, Computer-Arithmetik mit großen Zahlen, kryptographische Tools (Repos

Posted By: insetes
Kryptographie in C und C++: Zahlentheoretische Grundlagen, Computer-Arithmetik mit großen Zahlen, kryptographische Tools (Repos

Kryptographie in C und C++: Zahlentheoretische Grundlagen, Computer-Arithmetik mit großen Zahlen, kryptographische Tools By Michael Welschenbach
2001 | 409 Pages | ISBN: 3642626467 | PDF | 8 MB

Bitcoin: Free Money or Fraud?

Posted By: First1
Bitcoin: Free Money or Fraud?

Bitcoin: Free Money or Fraud? by Kyle Schurman
English | June 13th, 2013 | ASIN: B006GV8D8S, ISBN: 1614640297 | 74 Pages | EPUB | 1.00 MB

In today’s digital society could people choose to not use traditional money? Could there be an all electronic currency without the backing of government? Has cryptography and our computational security advanced to the point that such a currency could be handled on a peer-to-peer basis with no third-party intervention?

Serious Cryptography: A Practical Introduction to Modern Encryption

Posted By: tarantoga
Serious Cryptography: A Practical Introduction to Modern Encryption

Jean-Philippe Aumasson, "Serious Cryptography: A Practical Introduction to Modern Encryption"
ASIN: B0722MTGQV, ISBN: 1593278268 | 2017 | AZW3 | 312 pages | 4 MB

Introduction to Cryptography [Repost]

Posted By: tanas.olesya
Introduction to Cryptography [Repost]

Introduction to Cryptography (Undergraduate Texts in Mathematics) by Johannes Buchmann
English | 1 Jan. 2001 | ISBN: 0387950346 | 292 Pages | PDF | 17 MB

Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control and other such areas.

Discrete Algebraic Methods: Arithmetic, Cryptography, Automata and Groups

Posted By: Underaglassmoon
Discrete Algebraic Methods: Arithmetic, Cryptography, Automata and Groups

Discrete Algebraic Methods: Arithmetic, Cryptography, Automata and Groups
De Gruyter | English | 2016 | ISBN-10: 3110413329 | 342pages | PDF | 28.83 mb

by Volker Diekert (Author),‎ Manfred Kufleitner (Author),‎ Gerhard Rosenberger (Author),‎ Ulrich Hertrampf (Author)

Timing Channels in Cryptography [Repost]

Posted By: tanas.olesya
Timing Channels in Cryptography [Repost]

Timing Channels in Cryptography: A Micro-Architectural Perspective by Chester Rebeiro
English | 31 Dec. 2014 | ISBN: 3319123696 | 162 Pages | PDF | 6 MB

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors.

Achieving and Sustaining Secured Business Operations

Posted By: Underaglassmoon
Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations: An Executive’s Guide to Planning and Management
Apress | English | 2018 | ISBN-10: 1484230981 | 168 pages | PDF | 5.39 mb

by Neelesh Ajmani (Author), Dinesh Kumar (Author)