All counter of AlamanShop


Colin D. Walter, Cetin K. Dok, Christof Paar, Cetin K. Koc
Cryptographic Hardware and Embedded System, Ches 2003: 5th International Workshop, Cologne, Germany, September 8-10, 2003 : Proceedings (Lecture Notes in Computer Science, 2779)

— y.
Publisher: —
Description: This book constitutes the refereed proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2003, held in Cologne, Germany in September 2003. The 32 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on side channel attack methodology, hardware factorization, symmetric cypher attacks and countermeasures, secure hardware logic, random number generators, efficient multiplication, efficient arithmetics, attacks on asymmetric cryptosystems, implementation of symmetric cyphers, hyperelliptic curve cryptography, countermeasures to side channel leakage, and security of standards. [detailed...]

ISBN: 3540408339
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Ches 200, C. K. Koc, C. Paar
Cryptographic Hardware and Embedded Systems - Ches 2002: 4th International Workshop, Redwood Shores, Ca, Usa, August 2002 : Revised Papers (Lecture Notes in Computer Science, 2523)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 3540004092
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET

Cryptographic Hardware and Embedded Systems CHES 2008: 10th International Workshop, Washington, D.C., USA, August 10-13, 2008, Proceedings (Lecture Notes in Computer Science)

2008 y.
Publisher: —
Description: This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.C., USA, during August 10-13, 2008. The book contains 2 invited talks and 27 revised full papers which were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on side channel analysis, implementations, fault analysis, random number generation, and cryptography and cryptanalysis. [detailed...]

ISBN: 354085052X
Book size: —; Page extent: 445.

 

PUT TO
THE BASKET
Ed Moyle, Diana Kelley
Cryptographic Libraries for Developers (Programming Series)

2005 y.
Publisher: —
Description: Learn to Use the Right Cryptography Library Everytime! No longer is it an option for software to include cryptography, everyone from office suites to accounting software and eCommerce Web sites use it. So today?s developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familiar enough with the available products to select the right API/library and get up and running with it quickly. Cryptographic Libraries for Developers teaches developers about the available APIs and helps them select the right ones for their projects based on platform, language, and regulatory requirements. The book serves as a nuts and bolts guide to writing software using these libraries and provides abundant examples and detailed examples throughout. The libraries covered include OpenSSL, B/Safe, the Java Cryptographic Library (JCE,) as sign/verify, encrypt/decrypt (asymmetric and symmetric,)… [detailed...]

ISBN: 1584504099
Book size: —; Page extent: 512.

 

PUT TO
THE BASKET
Peter Gutmann
Cryptographic Security Architecture: Design and Verification

— y.
Publisher: —
Description: Traditional security toolkits have concentrated mostly on defining a programming interface (API) and left the internals up to individual implementors. This book presents a design for a portable, flexible security architecture based on traditional security models involving a security kernel that controls access to security-relevant objects and attributes based on a configurable security policy. Layered on top of the kernel are various objects that abstract core functionality, such as encryption and digital signature capabilities, certificate management, and secure sessions and data enveloping (email encryption) in a manner that allows them to be easily moved into cryptographic devices, such as smart cards and crypto accelerators for extra performance or security. The versatility of the design has been proven through its use in implementations ranging from 16-bit microcontrollers through to supercomputers, as well as a number of unusual areas, such as security modules in ATMs. [detailed...]

ISBN: 0387953876
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Douglas R. Stinson
Cryptography (Discrete Mathematics and Its Applications)

2005 y.
Publisher: —
Description: The third edition of this best-selling text provides unparalleled coverage of the use of cryptographic protocols that establish the steps that must be taken before any type of secret transmission can be completed. The author shows readers how the various parties to the transaction establish their cryptographic identities or keys, covers many of the cryptographic tools used in network security, and discusses topics that include copyright protection techniques and public key infrastructure. Cryptography: Theory and Practice, Third Edition is an outstanding text for senior undergraduate and graduate courses but also a useful reference for professionals interested in network security and cryptographic protocols. [detailed...]

ISBN: 1584885084
Book size: —; Page extent: 616.

 

PUT TO
THE BASKET
William Stallings
Cryptography And Network Security

2005 y.
Publisher: —
Description: In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support… [detailed...]

ISBN: 0131873164
Book size: —; Page extent: 592.

 

PUT TO
THE BASKET
H. X. Mel, Doris M. Baker
Cryptography Decrypted

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0201616475
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
John Hershey
Cryptography Demystified

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0071406387
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Cryptography Research Perspectives

2009 y.
Publisher: —
Description: Cryptography is considered to be a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering. Cryptography is used in applications present in technologically advanced societies, examples include the security of ATM cards, computer passwords, and electronic commerce, which all depend on cryptography. This book presents state-of-the-art research in the field from around the world. [detailed...]

ISBN: 160456492X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET

Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings (Lecture Notes in Computer Science)

2006 y.
Publisher: —
Description: This book constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, UK, in December 2005. The 26 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on coding theory, signatures and signcryption, symmetric cryptography, side channels, algebraic cryptanalysis, information theoretic applications, number theoretic foundations, and public key and ID-based encryption schemes. [detailed...]

ISBN: 354030276X
Book size: —; Page extent: 461.

 

PUT TO
THE BASKET
Kenneth G. Paterson, Institute of Mathematics and Its Applications
Cryptography and Coding: 9th Ima International Conference, Cirencester, Uk, December 2003 : Proceedings (LECTURE NOTES IN COMPUTER SCIENCE)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 3540206639
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Michael Walker
Cryptography and Coding

— y.
Publisher: —
Description: This book constitutes the refereed proceedings of the 7th IMA Conference on Cryptography and Coding held in Cirencester, UK, in December 1999. The 35 revised full papers presented were carefully reviewed and selected for inclusion in the proceedings. Among the topics covered are error-correcting coding, arithmetic coding for data compression and encryption, image coding, biometric authentication, broadcast channel access, graph and trellis decoding, turbo codes, convolution codes, Reed Solomon codes, elliptic curve cryptography, primality testing, finite-field arithmetic, and cryptographic protocols. [detailed...]

ISBN: 354066887X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
William Stallings
Cryptography and Network Security: Principles and Practice (3rd Edition)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0130914290
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Klaus Schmeh
Cryptography and Public Key Infrastructure on the Internet

— y.
Publisher: —
Description: Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers: Public Key Infrastructures (PKIs), important when using cryptography in a large organisation, the difference between the SSL protocol and the IPSec standard, integration of cryptography into the different OSI-layers, and how to decide whether hardware or software solutions are the right means to achieve this. The book also includes sections on:: standardisation authentication elliptic curve cryptography chip cards algorithm modes and protocols - including SSL, TLS, IPSec, SMIME and PGP protocols cryptography`s connection with biometry (using biological characteristics for authentication purposes). Cryptography and Public… [detailed...]

ISBN: 047084745X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Manuel Mogollon
Cryptography and Security Services: Mechanisms and Applications

2008 y.
Publisher: CyberTech Publishing
Description: Today`s information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and Applications addresses cryptography from the perspective of the security services and mechanisms available to implement these services: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and the confidentiality and integrity of security services. This book provides scholars and practitioners in the field of information assurance working knowledge of fundamental encryption algorithms and systems supported in information technology and secure communication networks. [detailed...]

ISBN: 0159904837
Book size: —; Page extent: 490.

 

PUT TO
THE BASKET
Michael Welschenbach
Cryptography in C and C++, Second Edition

2005 y.
Publisher: —
Description: This book covers all that is needed to write professional-level cryptographic code. An expanded and improved version of the very well received first edition, it includes approximately 100 pages of new material as well as numerous improvements in the original text. [detailed...]

ISBN: 1590595025
Book size: —; Page extent: 504.

 

PUT TO
THE BASKET
Michael Welschenbach, David Kramer
Cryptography in C and C++

— y.
Publisher: —
Description: Cryptography in C and C++ mainly focuses on the practical aspects involved in implementing public key cryptography methods, such as the RSA algorithm that was recently released from patent protection. It also gives both a technical overview andan implementation of the Rijndael algorithm that was selected as the Advanced Encryption Standard by the U.S. government. Author Michael Welschenbach avoids complexities by explaining cryptography and its mathematical basis in terms a programmer can easily understand. This book offers a comprehensive yet relentlessly practical overview of the fundamentals of modern cryptography. It contains a wide-ranging library of code in C and C++, including the RSA algorithm, completed by an extensive Test Suite that proves that the code works correctly. Readers will learn, step by step, how to implement a platform-independent library for the all-important multiprecision arithmetic used in modern cryptography. This is followed by an… [detailed...]

ISBN: 189311595X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Kevin Kenan
Cryptography in the Database: The Last Line of Defense

2005 y.
Publisher: —
Description: - [detailed...]

ISBN: 0321320735
Book size: —; Page extent: 312.

 

PUT TO
THE BASKET
Aiden Bruen, Mario A. Forcinito
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century

2004 y.
Publisher: —
Description: Stressing the interconnections of the areas of study, Cryptography, Information Theory, and Error-Correction offers a complete yet accessible account of the technologies shaping the twenty-first century. This title contains the most up-to-date, detailed, and balanced treatment available on these subjects. The authors draw on their experience both in the classroom and in industry, giving the books material and presentation a unique real-world orientation. Features include over 300 example problems and their solutions, the latest and most exciting new algorithms in use, discussion of cutting-edge cell biology applications, and a tiered approach to topics facilitating understanding by a wider group of readers. With its reader-friendly style and interdisciplinary emphasis, Cryptography, Information Theory, and Error-Correction serves as both an admirable teaching text and a tool for self-learning. [detailed...]

ISBN: 0471653179
Book size: —; Page extent: 496.

 

PUT TO
THE BASKET
Fred Piper, Sean Murphy
Cryptography: A Very Short Introduction

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0192803158
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Simon Shepherd
Cryptography: Diffusing the Confusion (Communications Systems, Techniques and Applications Series)

— y.
Publisher: —
Description: Thirty years ago, cryptography was the almost exclusive preserve of the Government and Military. Today it is the key technology underlying the Internet revolution and is of critical commercial and academic importance. The broadband technology necessary to make Internet commerce a reality is already with us, but the best networks in the world are effectively useless if no one will trust them with their sensitive commercial, financial, medical or military data. Most books on cryptography are written by mathematicians for mathematicians and assume more background than many are likely to possess. This book readdresses this balance with self-contained tutorial-styled chapters along with worked examples. Looking to the future, completion of the sequencing of the Human Genome has opened new doors in the treatment of disease. This book suggests it will be cryptographers not medics who will make critical advances. [detailed...]

ISBN: 0863802702
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Aaron Rosenberg
Cryptologists: Life Making and Breaking Codes (Extreme Careers)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0823939650
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Stephenson N.
Cryptonomicon

2007 y.
Publisher: —
Description: - [detailed...]

ISBN: 978-0-09-941067-6
Book size: —; Page extent: 918.

 

PUT TO
THE BASKET

Cryptosporidium and Cryptosporidiosis, Second Edition

2007 y.
Publisher: —
Description: - [detailed...]

ISBN: 1420052268
Book size: —; Page extent: 576.

 

PUT TO
THE BASKET
Craig Berntson, Dan Jurden
CrysDev: A Developer`s Guide to Integrating Crystal Reports

— y.
Publisher: —
Description: Covering the integration method recommended by Crystal Decisions, the Report Design Control (RDC), this book provides developers with an understanding of what components make up the RDC, how to use them, and what objects, collections, methods, and properties are available. Developers are shown how to provide users with printing, previewing, and report design capabilities. Also covered are how to determine which components to distribute, a step that has confused developers due to the number of files needed and their placement and registration on the target PC, and how to troubleshoot problems when they occur on the user’s computer. Additionally, developers are shown how to create reports using Crystal Reports .NET. [detailed...]

ISBN: 1930919387
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Monika Grundmann, Michael Gienger
Crystal Balance: A Step-by-Step Guide to Beauty and Health Through Crystal Massage

2008 y.
Publisher: —
Description: - [detailed...]

ISBN: 1844091325
Book size: —; Page extent: 112.

 

PUT TO
THE BASKET
Edited by Kullaiah Byrappa, Tadashi Ohachi
Crystal Growth Technology

2003 y.
Publisher: Springer
Description: Crystals are the unacknowledged pillars of the world of modern technology. Today`s technological developments depend critically on the availability of suitable single crystals, whether for lasers, semiconductors, magnetic devices, optical devices, superconductors or telecommunication. In spite of great technological advances in recent years, we are still at an early stage with respect to the growth of several important crystals such as diamond, silicon carbide, PZT and gallium nitride. This book covers all important aspects of crystal growth and growth techniques, together with relevant case studies. Particular emphasis is placed on new approaches designed to overcome the present limitations on crystal growth. The book will be essential reading for all scientists working on crystal growth. [detailed...]

ISBN: 3-54000-367-3
Book size: —; Page extent: 590.

 

PUT TO
THE BASKET
Brian Bischof
Crystal Reports .NET Programming

2004 y.
Publisher: —
Description: I wrote this book from the perspective of a programmer wanting to learn how to integrate reports within a .NET application. I`ve been working with Crystal Reports since Visual Basic 3 and it`s always been difficult to find technical information on report writing. I spent a year and a half researching what .NET programmers need to successfully create, implement and deploy a Crystal Reports application. I even put the book on the internet for everyone to read for free all of last year. This generated an incredible number of emails from programmers telling me what they liked, disliked, and what was missing from the book. I learned that there are two distinct types of .NET programmers using Crystal Reports. The first type of programmer doesn`t have much experience with Crystal Reports and wants a series of tutorials to help them build reports from scratch. For this programmer I wrote 13 chapters which teach you everything about adding reports to ASP.NET and Windows… [detailed...]

ISBN: 0974953652
Book size: —; Page extent: 525.

 

PUT TO
THE BASKET
Allen G. Taylor
Crystal Reports 2008 For Dummies (For Dummies (Computer/Tech))

2008 y.
Publisher: —
Description: A report is only useful if those who receive it understand what it means. Knowing how to use Crystal Reports gives you the edge in producing reports from your database that really are crystal clear. Crystal Reports 2008 For Dummies is a quick and easy guide to get you going with the latest version of this bestselling report-writing software. In fact, it’s so popular that previous editions have made it a bestseller too. Crystal Reports 2008 For Dummies gives you just what you should know to produce the reports you’ll need most often, including how to: Pull specific information from your database, sort and group it, and find the details you need Use dynamic or cascading prompts Troubleshoot and print reports and save time with templates View reports on your LAN Write formulas to retrieve specific information Create and update OLAP reports Format reports, control page breaks, and even add graphics or Flash files Enhance your reports… [detailed...]

ISBN: 0470290773
Book size: —; Page extent: 396.

 

PUT TO
THE BASKET
George Peck
Crystal Reports 2008: The Complete Reference (Complete Reference Series)

2008 y.
Publisher: —
Description: Your One-Stop Guide to Enterprise Reporting with Crystal Reports 2008Transform disconnected corporate data into compelling, interactive business intelligence using all of the powerful tools available in Crystal Reports 2008. Through detailed explanations, real-world examples, and expert advice, this comprehensive guide shows you how to create, maintain, and distribute dynamic, visually appealing enterprise database reports.Crystal Reports 2008: The Complete Reference explains how to select and gather pertinent business data, organize it into manageable groups, and assemble it into user-friendly business reports. You will learn how to improve report interactivity with sort controls and the parameter panel, solve complex reporting problems with cross-tabs and subreports, integrate Crystal Xcelsius dashboards, reduce development time, and publish your results to Web and Windows applications.Integrate pictures, multimedia files, graphs, and chartsAllow user-controlled report sorting with… [detailed...]

ISBN: 0071590986
Book size: —; Page extent: 968.

 

PUT TO
THE BASKET
Сайт создан в системе uCoz