You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary reference Key Features Learn about real-world cryptographic pitfalls and how to avoid them Understand past attacks on TLS, how these attacks worked, and how they were fixed Discover the inner workings of modern cryptography and its application within TLS Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionTLS is the most widely used cryptographic protocol today, enabling e-commerce, online banking, and secure online communication. Written by Dr. Paul Duplys, Security, Privacy & Safety Research Lead at Bosch, and Dr. Roland Schmitz, Internet Security Professor ...
Get a head start in real-world cryptography by learning the logic of algorithms that defend against attacks, and explore the latest in IoT homomorphic encryption and quantum cryptography Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features Explore the basic principles and history of cryptography Identify key vulnerabilities and evaluate how cryptographic algorithms defend against attacks Become a forward-thinking cryptographer by learning the new protocols in zero knowledge, homomorphic encryption and quantum cryptography Book DescriptionThis updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration...
Gain an in-depth understanding of the NIST Risk Management Framework life cycle and leverage real-world examples to identify and manage risks Key Features Implement NIST RMF with step-by-step instructions for effective security operations Draw insights from case studies illustrating the application of RMF principles in diverse organizational environments Discover expert tips for fostering a strong security culture and collaboration between security teams and the business Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionThis comprehensive guide provides clear explanations, best practices, and real-world examples to help readers navigate the NIST Risk Management F...
TLS is the most important and widely used security protocol in the world.
David Förster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems – motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protection enforced through cryptographic and technical means, which safeguards user data even if back-end systems are not fully trusted. Förster applies advanced cryptographic concepts, such as anonymous credentials, and introduces a novel decentralized secret sharing algorithm to fulfill complex and seemingly contradicting requirements in several vehicle-to-x application scenarios. Many of the concepts and results can also be applied to other flavors of internet of things systems.
This book tells the story of Hugh Everett III (1930-1982) who invented a theory of multiple universes that has had a profound impact on physics and philosophy. Everett strove to bring a "rational" order to the interlacing worlds of nuclear war and physics, even as his personal world disintegrated because of his indulgent lifestyle. Using Everett's unpublished papers and dozens of interviews, the book paints a detailed portrait of a man who influenced foundational thinking in quantum mechanics by inventing a way of viewing the universe from inside (known as the universal wave function). In addition to his famous interpretation of quantum mechanics, Everett wrote one of the classic papers in g...
Network Programming with Go teaches you how to write clean, secure network software with the programming language designed to make it seem easy. Build simple, reliable, network software Combining the best parts of many other programming languages, Go is fast, scalable, and designed for high-performance networking and multiprocessing. In other words, it’s perfect for network programming. Network Programming with Go will help you leverage Go to write secure, readable, production-ready network code. In the early chapters, you’ll learn the basics of networking and traffic routing. Then you’ll put that knowledge to use as the book guides you through writing programs that communicate using T...
'A truly remarkable writer, one of the most gifted non-fiction authors alive' Simon Schama, Financial Times Robespierre was only thirty-six when he died, sent to the guillotine where he had sent thousands ahead of him. Robespierre and the Revolution were inseparable: a single inflexible tyrant. But what turned a shy young lawyer into the living embodiment of the Terror at its most violent? Admirers called him 'the great incorruptible'; critics dubbed him a 'monster', a 'bloodthirsty charlatan'. Ruth Scurr sheds new light on this puzzle, tracing Robespierre's life from a troubled childhood in provincial Arras to the passionate idealist, fighting for the rights of the people, and sweeping on to the implacable leader prepared to sign the death warrant for his closest friends.
This work is a complete English translation of the Latin Etymologies of Isidore, Bishop of Seville (c.560–636). Isidore compiled the work between c.615 and the early 630s and it takes the form of an encyclopedia, arranged by subject matter. It contains much lore of the late classical world beginning with the Seven Liberal Arts, including Rhetoric, and touches on thousands of topics ranging from the names of God, the terminology of the Law, the technologies of fabrics, ships and agriculture to the names of cities and rivers, the theatrical arts, and cooking utensils. Isidore provides etymologies for most of the terms he explains, finding in the causes of words the underlying key to their meaning. This book offers a highly readable translation of the twenty books of the Etymologies, one of the most widely known texts for a thousand years from Isidore's time.
Summary HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Because HTTP/2 has been designed to be easy to transition to, including keeping it backwards compatible, adoption is rapid and expected to increase over the next few years. Concentrating on practical matters, this interesting book presents key HTTP/2 concepts such as frames, streams, and multiplexing and explores how they affect the performance and behavior of your websites. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology HTTP—Hypertext Transfer Protocol—is the standard for exchanging messages between websites and ...