Subcategories

SAP HANA Security Guide (SAP PRESS)

Posted By: First1
SAP HANA Security Guide (SAP PRESS)

SAP HANA Security Guide (SAP PRESS) by Jonathan Haun
English | June 30th, 2017 | ISBN: 1493214411 | 542 Pages | EPUB | 14.74 MB

How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an in-depth look at authentication and certificate management before seeing how to enable auditing and security tracing. Up to date for SAP HANA 2.0!

RSA and Public-Key Cryptography (Repost)

Posted By: step778
RSA and Public-Key Cryptography (Repost)

Richard A. Mollin, "RSA and Public-Key Cryptography"
2002 | pages: 275 | ISBN: 1584883383 | PDF | 1,3 mb

Practical Cyber Intelligence

Posted By: igor_lv
Practical Cyber Intelligence

Practical Cyber Intelligence by Wilson Bautista Jr.
English | 2018 | ISBN: 1788625560 | EPUB | 316 pages | 40 Mb
Cybernetics, Encryption

Serious Cryptography: A Practical Introduction to Modern Encryption

Posted By: viserion
Serious Cryptography: A Practical Introduction to Modern Encryption

Jean-Philippe Aumasson, "Serious Cryptography: A Practical Introduction to Modern Encryption"
ISBN: 1593278268 | 2017 | True PDF | 312 pages | 5 MB

Trends in Social Network Analysis: Information Propagation, User Behavior Modeling, Forecasting [Repost]

Posted By: AlexGolova
Trends in Social Network Analysis: Information Propagation, User Behavior Modeling, Forecasting [Repost]

Trends in Social Network Analysis: Information Propagation, User Behavior Modeling, Forecasting, and Vulnerability Assessment (Lecture Notes in Social Networks) by Rokia Missaoui
English | 19 May 2017 | ISBN: 331953419X | 272 Pages | PDF | 7.45 MB

Advances in Cryptology - EUROCRYPT 2017[Repost]

Posted By: AlexGolova
Advances in Cryptology - EUROCRYPT 2017[Repost]

Advances in Cryptology - EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, … Part II (Lecture Notes in Computer Science) by Jean-Sébastien Coron
English | 1 Apr. 2017 | ISBN: 331956613X | 700 Pages | PDF | 17.73 MB

Mathematical Morphology and Its Applications to Signal and Image Processing: 13th International Symposium [Repost]

Posted By: AlexGolova
Mathematical Morphology and Its Applications to Signal and Image Processing: 13th International Symposium [Repost]

Mathematical Morphology and Its Applications to Signal and Image Processing: 13th International Symposium, ISMM 2017, Fontainebleau, France, May … (Lecture Notes in Computer Science) by Jesús Angulo
English | 12 Apr. 2017 | ISBN: 3319572393 | 516 Pages | PDF | 67.18 MB

Advances in Artificial Life, Evolutionary Computation, and Systems Chemistry [Repost]

Posted By: AlexGolova
Advances in Artificial Life, Evolutionary Computation, and Systems Chemistry [Repost]

Advances in Artificial Life, Evolutionary Computation, and Systems Chemistry: 11th Italian Workshop, WIVACE 2016, Fisciano, Italy, October 4-6, 2016, … in Computer and Information Science) by Federico Rossi
English | 21 Apr. 2017 | ISBN: 3319577107 | 212 Pages | PDF | 18.16 MB

Why Cryptography Should Not Rely on Physical Attack Complexity

Posted By: arundhati
Why Cryptography Should Not Rely on Physical Attack Complexity

Juliane Krämer, "Why Cryptography Should Not Rely on Physical Attack Complexity"
2015 | ISBN-10: 981287786X | 122 pages | EPUB | 2 MB

Cyber Security Cryptography and Machine Learning[Repost]

Posted By: AlexGolova
Cyber Security Cryptography and Machine Learning[Repost]

Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings (Lecture Notes in Computer Science) by Shlomi Dolev
English | 3 Jun. 2017 | ISBN: 3319600796 | 320 Pages | PDF | 15.64 MB

An Introduction to Number Theory with Cryptography, Second Edition

Posted By: roxul
An Introduction to Number Theory with Cryptography, Second Edition

James Kraft, Lawrence Washington, "An Introduction to Number Theory with Cryptography, Second Edition"
English | ISBN: 1138063479 | 2018 | 602 pages | PDF | 17 MB

Guide to Pairing-Based Cryptography

Posted By: arundhati
Guide to Pairing-Based Cryptography

Nadia El Mrabet, "Guide to Pairing-Based Cryptography"
2017 | ISBN-10: 1498729509 | 436 pages | PDF true | 6 MB

Take Control of 1Password, 3rd Edition

Posted By: First1
Take Control of 1Password, 3rd Edition

Take Control of 1Password, 3rd Edition by Joe Kissell
English | February 12th, 2018 | ASIN: B079TZ5DCF, ISBN: 1492066427 | 214 Pages | EPUB | 3.95 MB

Easily create and enter secure passwords on all your devices!

Getting Started with Cryptocurrency [Audiobook]

Posted By: First1
Getting Started with Cryptocurrency [Audiobook]

Getting Started with Cryptocurrency [Audiobook] by James David Rockefeller
English | November 30th, 2017 | ASIN: B077SNX5BX | MP3@64 kbps | 24 mins | 11.80 MB
Narrator: Ginger White

Are you familiar with terms such as Bitcoin, ethereum, litecoins, and whatnot? Maybe you have heard these terms, but do you have any idea about what they are? Maybe you know they are related to cryptocurrency, but do you know how to use them and move ahead investing through them?

Security without Obscurity: A Guide to PKI Operations (Repost)

Posted By: step778
Security without Obscurity: A Guide to PKI Operations (Repost)

Jeff Stapleton, W. Clay Epstein, "Security without Obscurity: A Guide to PKI Operations"
2016 | pages: 350 | ISBN: 1498707475 | PDF | 21,7 mb