Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeMusic

Theory of Cryptography, Part I

Posted By: step778
Theory of Cryptography, Part I

Yevgeniy Dodis, Jesper Buus Nielsen, "Theory of Cryptography, Part I"
2015 | pages: 676 | ISBN: 3662464934 | PDF | 7,4 mb

Implementing SSL / TLS Using Cryptography and PKI

Posted By: tarantoga
Implementing SSL / TLS Using Cryptography and PKI

Joshua Davies, "Implementing SSL / TLS Using Cryptography and PKI"
ISBN: 0470920416 | 2011 | EPUB | 696 pages | 7 MB

Security, Privacy, and Applied Cryptography Engineering

Posted By: DZ123
Security, Privacy, and Applied Cryptography Engineering

Rajat Subhra Chakraborty, Vashek Matyas, Patrick Schaumont, "Security, Privacy, and Applied Cryptography Engineering"
English | 2014 | ISBN: 331912059X | PDF | pages: 349 | 8.6 mb

Theory of Cryptography, Part II

Posted By: step778
Theory of Cryptography, Part II

Yevgeniy Dodis, Jesper Buus Nielsen, "Theory of Cryptography, Part II"
2015 | pages: 715 | ISBN: 3662464969 | PDF | 7,3 mb

The Turing Guide

Posted By: ksveta6
The Turing Guide

The Turing Guide by Jack Copeland, Jonathan Bowen, Mark Sprevak, Robin Wilson
2017 | ISBN: 0198747829, 0198747837 | English | 544 pages | PDF | 22 MB

Boundary Retracement: Processes and Procedures

Posted By: Underaglassmoon
Boundary Retracement: Processes and Procedures

Boundary Retracement: Processes and Procedures
CRC Press | English | Feb. 21 2017 | ISBN-10: 1498727107 | 496 pages | PDF | 11.34 mb

by Donald A. Wilson (Author)

Advances in Cryptology -- EUROCRYPT 2015, Part I (Repost)

Posted By: step778
Advances in Cryptology -- EUROCRYPT 2015, Part I (Repost)

Elisabeth Oswald, Marc Fischlin, "Advances in Cryptology – EUROCRYPT 2015, Part I"
2015 | pages: 814 | ISBN: 3662467992 | PDF | 15,5 mb

Information Security Applications [Repost]

Posted By: tanas.olesya
Information Security Applications [Repost]

Information Security Applications (Lecture Notes in Computer Science) by Kyung-Hyune Rhee
English | 28 Jan. 2015 | ISBN: 3319150863 | 405 Pages | PDF | 40 MB

The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.

Formal Correctness of Security Protocols [Repost]

Posted By: tanas.olesya
Formal Correctness of Security Protocols [Repost]

Formal Correctness of Security Protocols (Information Security and Cryptography) by Giampaolo Bella
English | 5 Mar. 2007 | ISBN: 3540681345 | 281 Pages | PDF | 3 MB

The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols.

Post-Quantum Cryptography

Posted By: DZ123
Post-Quantum Cryptography

Michele Mosca, "Post-Quantum Cryptography"
English | 2014 | ISBN: 3319116584 | PDF | pages: 292 | 5.8 mb

Progress in Cryptology -- INDOCRYPT 2014

Posted By: DZ123
Progress in Cryptology -- INDOCRYPT 2014

Willi Meier, Debdeep Mukhopadhyay, "Progress in Cryptology – INDOCRYPT 2014"
English | 2014 | ISBN: 3319130382 | PDF | pages: 455 | 12.9 mb

Topics in Cryptology – CT-RSA 2017: The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA

Posted By: Nice_smile)
Topics in Cryptology – CT-RSA 2017: The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA

Topics in Cryptology – CT-RSA 2017: The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings by Helena Handschuh
English | 2017 | ISBN: 3319521527 | 452 Pages | PDF | 13.24 MB

Topics in Geometry, Coding Theory and Cryptography (Repost)

Posted By: step778
Topics in Geometry, Coding Theory and Cryptography (Repost)

Arnaldo Garcia, Henning Stichtenoth, "Topics in Geometry, Coding Theory and Cryptography"
2006 | pages: 210 | ISBN: 1402053339 | PDF | 2,7 mb

Cybersecurity Law

Posted By: Underaglassmoon
Cybersecurity Law

Cybersecurity Law
Wiley | English | March 2017 | ISBN-10: 1119231507 | 528 pages | PDF | 2.89 mb

by Jeff Kosseff (Author)

Quantum Attacks on Public-Key Cryptosystems [Repost]

Posted By: ChrisRedfield
Quantum Attacks on Public-Key Cryptosystems [Repost]

Song Y. Yan - Quantum Attacks on Public-Key Cryptosystems
Published: 2013-04-27 | ISBN: 144197721X, 1489997792 | PDF | 207 pages | 2.89 MB