Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Multicast and Group Security
  • Language: en
  • Pages: 344

Multicast and Group Security

A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.

SSL and TLS: Theory and Practice, Third Edition
  • Language: en
  • Pages: 383

SSL and TLS: Theory and Practice, Third Edition

  • Type: Book
  • -
  • Published: 2023-06-30
  • -
  • Publisher: Artech House

Now in its Third Edition, this completely revised and updated reference provides a thorough and comprehensive introduction into the SSL, TLS, and DTLS protocols, explaining all the details and technical subtleties and showing how the current design helps mitigate the attacks that have made press headlines in the past. The book tells the complete story of TLS, from its earliest incarnation (SSL 1.0 in 1994), all the way up to and including TLS 1.3. Detailed descriptions of each protocol version give you a full understanding of why the protocol looked like it did, and why it now looks like it does. You will get a clear, detailed introduction to TLS 1.3 and understand the broader context of how...

Information Hiding
  • Language: en
  • Pages: 319

Information Hiding

  • Type: Book
  • -
  • Published: 2016-01-01
  • -
  • Publisher: Artech House

A successor to the popular Artech House title Information Hiding Techniques for Steganography and Digital Watermarking, this comprehensive and up-to-date new resource gives the reader a thorough review of steganography, digital watermarking and media fingerprinting with possible applications to modern communication, and a survey of methods used to hide information in modern media. This book explores Steganography, as a means by which two or more parties may communicate using invisible or subliminal communication. "Steganalysis" is described as methods which can be used to break steganographic communication. This comprehensive resource also includes an introduction to watermarking and its methods, a means of hiding copyright data in images and discusses components of commercial multimedia applications that are subject to illegal use. This book demonstrates a working knowledge of watermarking’s pros and cons, and the legal implications of watermarking and copyright issues on the Internet.

Outsourcing Information Security
  • Language: en
  • Pages: 292

Outsourcing Information Security

This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

Official Gazette of the United States Patent and Trademark Office
  • Language: en
  • Pages: 1390

Official Gazette of the United States Patent and Trademark Office

  • Type: Book
  • -
  • Published: 2001
  • -
  • Publisher: Unknown

None

Secure Data Management for Online Learning Applications
  • Language: en
  • Pages: 372

Secure Data Management for Online Learning Applications

  • Type: Book
  • -
  • Published: 2023-04-05
  • -
  • Publisher: CRC Press

With the increasing use of e-learning, technology has not only revolutionized the way businesses operate but has also impacted learning processes in the education sector. E-learning is slowly replacing traditional methods of teaching and security in e-learning is an important issue in this educational context. With this book, you will be familiarized with the theoretical frameworks, technical methodologies, information security, and empirical research findings in the field to protect your computers and information from threats. Secure Data Management for Online Learning Applications will keep you interested and involved throughout.

The Penetration Tester's Guide to Web Applications
  • Language: en
  • Pages: 217

The Penetration Tester's Guide to Web Applications

  • Type: Book
  • -
  • Published: 2019-06-30
  • -
  • Publisher: Artech House

This innovative new resource provides both professionals and aspiring professionals with clear guidance on how to identify and exploit common web application vulnerabilities. The book focuses on offensive security and how to attack web applications. It describes each of the Open Web Application Security Project (OWASP) top ten vulnerabilities, including broken authentication, cross-site scripting and insecure deserialization, and details how to identify and exploit each weakness. Readers learn to bridge the gap between high-risk vulnerabilities and exploiting flaws to get shell access. The book demonstrates how to work in a professional services space to produce quality and thorough testing results by detailing the requirements of providing a best-of-class penetration testing service. It offers insight into the problem of not knowing how to approach a web app pen test and the challenge of integrating a mature pen testing program into an organization. Based on the author’s many years of first-hand experience, this book provides examples of how to break into user accounts, how to breach systems, and how to configure and wield penetration testing tools.

Bluetooth Security
  • Language: en
  • Pages: 234

Bluetooth Security

This first-of-its-kind book, from expert authors actively contributing to the evolution of Bluetooth specifications, provides an overview and detailed descriptions of all the security functions and features of this standard's latest core release. After categorizing all the security issues involved in ad hoc networking, this hands-on volume shows you how to design a highly secure Bluetooth system and implement security enhancements. The book also helps you fully understand the main security risks involved with introducing Bluetooth-based communications in your organization

SSL and TLS: Theory and Practice, Second Edition
  • Language: en
  • Pages: 301

SSL and TLS: Theory and Practice, Second Edition

  • Type: Book
  • -
  • Published: 2016-03-31
  • -
  • Publisher: Artech House

This completely revised and expanded second edition of SSL and TLS: Theory and Practice provides an overview and a comprehensive discussion of the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram TLS (DTLS) protocols that are omnipresent in today's e-commerce and e-business applications and respective security solutions. It provides complete details on the theory and practice of the protocols, offering readers a solid understanding of their design principles and modes of operation. Updates to this edition include coverage of the recent attacks against the protocols, newly specified extensions and firewall traversal, as well as recent developments related to public key...

Cryptography 101: From Theory to Practice
  • Language: en
  • Pages: 650

Cryptography 101: From Theory to Practice

  • Type: Book
  • -
  • Published: 2021-06-30
  • -
  • Publisher: Artech House

This exciting new resource provides a comprehensive overview of the field of cryptography and the current state of the art. It delivers an overview about cryptography as a field of study and the various unkeyed, secret key, and public key cryptosystems that are available, and it then delves more deeply into the technical details of the systems. It introduces, discusses, and puts into perspective the cryptographic technologies and techniques, mechanisms, and systems that are available today. Random generators and random functions are discussed, as well as one-way functions and cryptography hash functions. Pseudorandom generators and their functions are presented and described. Symmetric encryption is explored, and message authentical and authenticated encryption are introduced. Readers are given overview of discrete mathematics, probability theory and complexity theory. Key establishment is explained. Asymmetric encryption and digital signatures are also identified. Written by an expert in the field, this book provides ideas and concepts that are beneficial to novice as well as experienced practitioners.