37 rezultatov
-
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers(2005) KEVIN MITNICKVezava: Mehka19,45 €
KEVIN MITNICK
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Zaloga po trgovinah
Rezultati:
-
The Art of Deception: Controlling the Human Element of Security(2003) KEVIN MITNICKVezava: Mehka13,90 €
KEVIN MITNICK
The Art of Deception: Controlling the Human Element of Security
Zaloga po trgovinah
Rezultati:
-
Codebreaking(2020) DUNIN, ELONKA,SCHMEH, KLAUSA practical guide by two world experts to codebreaking and solving cryptograms. There are tens of thousands of such cryptograms, both modern and historical, many of which remain unsolved. The guide is complemented by both success stories and details of unVezava: Mehka vezava23,61 €
DUNIN, ELONKA,SCHMEH, KLAUS
Codebreaking
A practical guide by two world experts to codebreaking and solving cryptograms. There are tens of thousands of such cryptograms, both modern and historical, many of which remain unsolved. The guide is complemented by both success stories and details of un
Zaloga po trgovinah
Rezultati:
-
-
-
Integer Algorithms In Cryptology And Information Assurance(2014) VERKHOVSKY, BORIS S (NEW JERSEY INST OF TECHNOLOGY, USA)Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocols for secret and reliable communication.Vezava: Trda214,10 €
VERKHOVSKY, BORIS S (NEW JERSEY INST OF TECHNOLOGY, USA)
Integer Algorithms In Cryptology And Information Assurance
Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocols for secret and reliable communication.
Zaloga po trgovinah
Rezultati:
-
CompTIA CySA+ Study Guide(2023) CHAPPLE, MIKE (UNIVERSITY OF NOTRE DAME),SEIDL, DAVIDVezava: Mehka60,93 €
CHAPPLE, MIKE (UNIVERSITY OF NOTRE DAME),SEIDL, DAVID
CompTIA CySA+ Study Guide
Zaloga po trgovinah
Rezultati:
-
MCE Microsoft Certified Expert Cybersecurity Architect Study Guide(2023) UDAYAKUMAR, KATHIRAVAN,UDAYAKUMAR, PUTHIYAVANVezava: Mehka67,19 €
UDAYAKUMAR, KATHIRAVAN,UDAYAKUMAR, PUTHIYAVAN
MCE Microsoft Certified Expert Cybersecurity Architect Study Guide
Zaloga po trgovinah
Rezultati:
-
Database Hacker's Handbook(2005) LITCHFIELD, DAVID,ANLEY, CHRIS,HEASMAN, JOHN,GRINDLAY, BILLDatabases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacVezava: Mehka44,46 €
LITCHFIELD, DAVID,ANLEY, CHRIS,HEASMAN, JOHN,GRINDLAY, BILL
Database Hacker's Handbook
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attac
Zaloga po trgovinah
Rezultati:
-
Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®(2005)A guide to the CISSP-ISSEP CBK. It promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE), Certification and Accreditation, Technical Management, and an Introduction to United States Government Information AssuraVezava: Trda133,86 €
Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®
A guide to the CISSP-ISSEP CBK. It promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE), Certification and Accreditation, Technical Management, and an Introduction to United States Government Information Assura
Zaloga po trgovinah
Rezultati:
-
Foundations of Cryptography: Volume 1, Basic Tools(2007) GOLDREICH, ODED (WEIZMANN INSTITUTE OF SCIENCE, ISRAEL)Focuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs.Vezava: Mehka86,49 €
GOLDREICH, ODED (WEIZMANN INSTITUTE OF SCIENCE, ISRAEL)
Foundations of Cryptography: Volume 1, Basic Tools
Focuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs.
Zaloga po trgovinah
Rezultati:
-
Handbook of Elliptic and Hyperelliptic Curve Cryptography(2005)Introduces the theory and algorithms involved in curve-based cryptography. This book provides ready-to-implement algorithms for the group operations and computation of pairings. It explores methods for point counting and constructing curves with the complVezava: Trda338,63 €
Handbook of Elliptic and Hyperelliptic Curve Cryptography
Introduces the theory and algorithms involved in curve-based cryptography. This book provides ready-to-implement algorithms for the group operations and computation of pairings. It explores methods for point counting and constructing curves with the compl
Zaloga po trgovinah
Rezultati:
-
-
Programming Bitcoin(2019) SONG, JIMMYDive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a Bitcoin library from scratch.Vezava: Mehka82,08 €
SONG, JIMMY
Programming Bitcoin
Dive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a Bitcoin library from scratch.
Zaloga po trgovinah
Rezultati:
-
Software Design X-Rays(2018) TORNHILL, ADAMAre you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers woVezava: Mehka51,40 €
TORNHILL, ADAM
Software Design X-Rays
Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers wo
Zaloga po trgovinah
Rezultati:
-
Mastering Corda - Blockchain for Java Developers(2020) SHEIKH, JAMIELUsing this book, anyone from a complete blockchain beginner to an experienced blockchain or enterprise architect can rapidly understand and write applications like a pro while exploring the technical nuances and intricacies of the Corda platform.Vezava: Mehka82,08 €
SHEIKH, JAMIEL
Mastering Corda - Blockchain for Java Developers
Using this book, anyone from a complete blockchain beginner to an experienced blockchain or enterprise architect can rapidly understand and write applications like a pro while exploring the technical nuances and intricacies of the Corda platform.
Zaloga po trgovinah
Rezultati:
-
Hands-On Smart Contract Development with Solidity and Ethereum(2019) SOLORIO, KEVIN,KANNA, RANDALL,HOOVER, DAVID HReady to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum—the open source blockchain-based distribVezava: Mehka67,97 €
SOLORIO, KEVIN,KANNA, RANDALL,HOOVER, DAVID H
Hands-On Smart Contract Development with Solidity and Ethereum
Ready to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum—the open source blockchain-based distrib
Zaloga po trgovinah
Rezultati:
-
Blockchain Basics: A Non-Technical Introduction in 25 Steps(2017) DANIEL DRESCHERVezava: Mehka46,29 €
DANIEL DRESCHER
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Zaloga po trgovinah
Rezultati:
-
-
Exploding Data - Reclaiming Our Cyber Security in the Digital Age(2018) CHERTOFF, MICHAELA powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security.Vezava: Trda27,79 €
CHERTOFF, MICHAEL
Exploding Data - Reclaiming Our Cyber Security in the Digital Age
A powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security.
Zaloga po trgovinah
Rezultati: