Primality Testing in Polynomial Time: From Randomized Algorithms to "PRIMES Is in P" (Lecture Notes in Computer Science) by Martin Dietzfelbinger English | 2008 | ISBN: 3540403442, 9783540403449 | 150 Pages | PDF | 984.62 KB
Encyclopedia of Cryptography and Security by Henk C.A. van Tilborg English | 6 Sept. 2005 | ISBN: 038723473X | 684 Pages | PDF | 5 MB
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security.
Investigator's Guide to Steganography by Gregory Kipper English | 27 Oct. 2003 | ISBN: 0849324335 | 240 Pages | CHM | 6 MB
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to.
RSA Security's Official Guide to Cryptography by Steve Burnett English | 1 Apr. 2001 | ISBN: 007213139X | 449 Pages | PDF | 9 MB
Want to keep your Web site safe? Learn how to implement cryptography, the most secure form of data encryption. Highly accessible, and packed with detailed case studies, this practical guide is written in conjunction with RSA Security - the most trusted name in e-security.
Progress in Cryptology - AFRICACRYPT 2010 Security and Cryptology)456 by Daniel J. Bernstein English | 14 Apr. 2010 | ISBN: 3642126774 | 447 Pages | PDF | 5 MB
This book constitutes the proceedings of the Third International Conference on Cryptology in Africa, AFRICACRYPT 2010, held in Stellenbosch, South Africa, on May 3-6, 2010. The 25 papers presented together with three invited talks were carefully reviewed and selected from 82 submissions.
Codes: The Guide to Secrecy From Ancient to Modern Times by Richard A. Mollin English | 24 May 2005 | ISBN: 1584884703 | 704 Pages | PDF | 5 MB
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems.