You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary reference Key Features Learn about real-world cryptographic pitfalls and how to avoid them Understand past attacks on TLS, how these attacks worked, and how they were fixed Discover the inner workings of modern cryptography and its application within TLS Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionTLS is the most widely used cryptographic protocol today, enabling e-commerce, online banking, and secure online communication. Written by Dr. Paul Duplys, Security, Privacy & Safety Research Lead at Bosch, and Dr. Roland Schmitz, Internet Security Professor ...
TLS is the most important and widely used security protocol in the world.
Get a head start in real-world cryptography by learning the logic of algorithms that defend against attacks, and explore the latest in IoT homomorphic encryption and quantum cryptography Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features Explore the basic principles and history of cryptography Identify key vulnerabilities and evaluate how cryptographic algorithms defend against attacks Become a forward-thinking cryptographer by learning the new protocols in zero knowledge, homomorphic encryption and quantum cryptography Book DescriptionThis updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration...
Gain an in-depth understanding of the NIST Risk Management Framework life cycle and leverage real-world examples to identify and manage risks Key Features Implement NIST RMF with step-by-step instructions for effective security operations Draw insights from case studies illustrating the application of RMF principles in diverse organizational environments Discover expert tips for fostering a strong security culture and collaboration between security teams and the business Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionThis comprehensive guide provides clear explanations, best practices, and real-world examples to help readers navigate the NIST Risk Management F...
David Förster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems – motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protection enforced through cryptographic and technical means, which safeguards user data even if back-end systems are not fully trusted. Förster applies advanced cryptographic concepts, such as anonymous credentials, and introduces a novel decentralized secret sharing algorithm to fulfill complex and seemingly contradicting requirements in several vehicle-to-x application scenarios. Many of the concepts and results can also be applied to other flavors of internet of things systems.
Peter Byrne tells the story of Hugh Everett III (1930-1982), whose "many worlds" theory of multiple universes has had a profound impact on physics and philosophy. Using Everett's unpublished papers (recently discovered in his son's basement) and dozens of interviews with his friends, colleagues, and surviving family members, Byrne paints, for the general reader, a detailed portrait of the genius who invented an astonishing way of describing our complex universe from the inside. Everett's mathematical model (called the "universal wave function") treats all possible events as "equally real", and concludes that countless copies of every person and thing exist in all possible configurations spre...
Network Programming with Go teaches you how to write clean, secure network software with the programming language designed to make it seem easy. Build simple, reliable, network software Combining the best parts of many other programming languages, Go is fast, scalable, and designed for high-performance networking and multiprocessing. In other words, it’s perfect for network programming. Network Programming with Go will help you leverage Go to write secure, readable, production-ready network code. In the early chapters, you’ll learn the basics of networking and traffic routing. Then you’ll put that knowledge to use as the book guides you through writing programs that communicate using T...
'A truly remarkable writer, one of the most gifted non-fiction authors alive' Simon Schama, Financial Times Robespierre was only thirty-six when he died, sent to the guillotine where he had sent thousands ahead of him. Robespierre and the Revolution were inseparable: a single inflexible tyrant. But what turned a shy young lawyer into the living embodiment of the Terror at its most violent? Admirers called him 'the great incorruptible'; critics dubbed him a 'monster', a 'bloodthirsty charlatan'. Ruth Scurr sheds new light on this puzzle, tracing Robespierre's life from a troubled childhood in provincial Arras to the passionate idealist, fighting for the rights of the people, and sweeping on to the implacable leader prepared to sign the death warrant for his closest friends.
Comprehensive account of the great revolutions that swept over Europe and America.
Summary HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Because HTTP/2 has been designed to be easy to transition to, including keeping it backwards compatible, adoption is rapid and expected to increase over the next few years. Concentrating on practical matters, this interesting book presents key HTTP/2 concepts such as frames, streams, and multiplexing and explores how they affect the performance and behavior of your websites. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology HTTP—Hypertext Transfer Protocol—is the standard for exchanging messages between websites and ...