|
|
Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
This timely book is an innovative look at how blockchain technology
will transform the structure of social and economic life. The
security of blockchain supports the provision and maintenance of
reliable databases and the creation of rule-based governance
protocols. Leading contributors expertly review the impact of
blockchain on existing structures of law, monetary systems, supply
chains and business organizations. Using economic and institutional
theory, the book presents a vision for understanding the future
development of blockchain technology and outlines the likely path
of transformation that blockchain will drive in industry, supply
chains and firms. Furthermore, it answers key questions such as:
will Bitcoin or another cryptocurrency become the money of the
future? How has blockchain already begun transforming economic
activity? How can we evaluate the likely trajectory of
technological development and application? This informative book is
an excellent resource for academics or professionals interested in
a theoretically sound perspective on blockchain. Written in an
accessible prose, it provides an introduction for non-experts
looking to learn more about the wide-ranging implications of
blockchain and cryptocurrency.
This compendium focuses on self-contained presentations of various
developments in mathematical analysis, cryptography and information
science.The volume features both original research and survey
papers contributed by experts from the international community. The
book has a strong interdisciplinary flavor and features the most
recent developments in the topics treated.This useful reference
text benefits professionals, researchers, academics and graduate
students.
Learn application security from the very start, with this
comprehensive and approachable guide! Alice and Bob Learn
Application Security is an accessible and thorough resource for
anyone seeking to incorporate, from the beginning of the System
Development Life Cycle, best security practices in software
development. This book covers all the basic subjects such as threat
modeling and security testing, but also dives deep into more
complex and advanced topics for securing modern software systems
and architectures. Throughout, the book offers analogies, stories
of the characters Alice and Bob, real-life examples, technical
explanations and diagrams to ensure maximum clarity of the many
abstract and complicated subjects. Topics include: Secure
requirements, design, coding, and deployment Security Testing (all
forms) Common Pitfalls Application Security Programs Securing
Modern Applications Software Developer Security Hygiene Alice and
Bob Learn Application Security is perfect for aspiring application
security engineers and practicing software developers, as well as
software project managers, penetration testers, and chief
information security officers who seek to build or improve their
application security programs. Alice and Bob Learn Application
Security illustrates all the included concepts with
easy-to-understand examples and concrete practical applications,
furthering the reader's ability to grasp and retain the
foundational and advanced topics contained within.
The rapid advancements in telecommunications, computing hardware
and software, and data encryption, and the widespread use of
electronic data processing and electronic business conducted
through the Internet have led to a strong increase in information
security threats. The latest advances in information security have
increased practical deployments and scalability across a wide range
of applications to better secure and protect our information
systems and the information stored, processed and transmitted. This
book outlines key emerging trends in information security from the
foundations and technologies in biometrics, cybersecurity, and big
data security to applications in hardware and embedded systems
security, computer forensics, the Internet of Things security, and
network security. Information Security: Foundations, technologies
and applications is a comprehensive review of cutting-edge
algorithms, technologies, and applications, and provides new
insights into a range of fundamentally important topics in the
field. This up-to-date body of knowledge is essential reading for
researchers and advanced students in information security, and for
professionals in sectors where information security is required.
 |
TLS Mastery
(Hardcover)
Michael W Lucas
|
R893
R812
Discovery Miles 8 120
Save R81 (9%)
|
Ships in 18 - 22 working days
|
|
|
A fascinating work on the history and development of cryptography,
from the Egyptians to WWII. Many of the earliest books,
particularly those dating back to the 1900s and before, are now
extremely scarce and increasingly expensive. Hesperides Press are
republishing these classic works in affordable, high quality,
modern editions, using the original text and artwork Contents
Include The Beginings of Cryptography From the Middle Ages Onwards
Signals, Signs, And Secret Languages Commercial Codes Military
Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering
Bibliography
It was formidable, and it was deadly. The nazi Enigma cipher
machine, or rather the code that came from it would also have
remained indeterminable had an operator not made a very simple
error. In this collection of several dozen papers on the machine
and its implications in a variety of disciplines, ranging from
history to memoir and even foreign r
This is the unique book on cross-fertilisations between stream
ciphers and number theory. It systematically and comprehensively
covers known connections between the two areas that are available
only in research papers. Some parts of this book consist of new
research results that are not available elsewhere. In addition to
exercises, over thirty research problems are presented in this
book. In this revised edition almost every chapter was updated, and
some chapters were completely rewritten. It is useful as a textbook
for a graduate course on the subject, as well as a reference book
for researchers in related fields.
.Unique book on interactions of stream ciphers and number theory.
.Research monograph with many results not available elsewhere.
.A revised edition with the most recent advances in this subject.
.Over thirty research problems for stimulating interactions between
the two areas.
.Written by leading researchers in stream ciphers and number
theory.
This book comprehensively covers the important efforts in improving
the quality of images in visual cryptography (VC), with a focus on
cases with gray scale images. It not only covers schemes in
traditional VC and extended VC for binary secret images, but also
the latest development in the analysis-by-synthesis approach. This
book distinguishes itself from the existing literature in three
ways. First, it not only reviews traditional VC for binary secret
images, but also covers recent efforts in improving visual quality
for gray scale secret images. Second, not only traditional quality
measures are reviewed, but also measures that were not used for
measuring perceptual quality of decrypted secret images, such as
Radially Averaged Power Spectrum Density (RAPSD) and residual
variance, are employed for evaluating and guiding the design of VC
algorithms. Third, unlike most VC books following a mathematical
formal style, this book tries to make a balance between engineering
intuition and mathematical reasoning. All the targeted problems and
corresponding solutions are fully motivated by practical
applications and evaluated by experimental tests, while important
security issues are presented as mathematical proof. Furthermore,
important algorithms are summarized as pseudocodes, thus enabling
the readers to reproduce the results in the book. Therefore, this
book serves as a tutorial for readers with an engineering
background as well as for experts in related areas to understand
the basics and research frontiers in visual cryptography.
This monograph aims to provide a well-rounded and detailed account
of designs using linear codes. Most chapters of this monograph
cover on the designs of linear codes. A few chapters deal with
designs obtained from linear codes in other ways. Connections among
ovals, hyperovals, maximal arcs, ovoids, linear codes and designs
are also investigated. This book consists of both classical results
on designs from linear codes and recent results yet published by
others.This monograph is intended to be a reference for
postgraduates and researchers who work on combinatorics, or coding
theory, or digital communications, or finite geometry.
|
|