Listing 1 - 6 of 6 |
Sort by
|
Choose an application
The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990's. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but also in some negative results regarding the potential of various attempts at generalization. This book gives an overview of the current state of the discipline and it takes a look at potential future developments, and is divided into five parts. The first part deals with basic assumptions in linear cry
Coding theory. --- Cryptography. --- Cryptography --- Ciphers --- Education --- Social Sciences --- Book Studies & Arts --- Ciphers. --- Codes --- Contractions --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Abbreviations --- Code names --- Writing --- Data encryption (Computer science) --- E-books
Choose an application
Préservez votre sécurité dans un monde toujours plus connecté ! L'hygiène numérique correspond aux gestes simples que tout un chacun doit mettre en œuvre, chaque jour, pour vivre sereinement dans un monde numérique en se protégeant des risques qui s'y sont développés (vol de données, fraudes, arnaques, etc.). Pour maintenir en pleine santé votre ordinateur, téléphone ou tablette, découvrez 129 bonnes pratiques à adopter et organisées selon ces huit thématiques : les bonnes manières de choisir et gérer ses mots de passe ; la divulgation, volontaire ou non, de ses données personnelles ; la gestion de ses données numériques et leur traçabilité ; les principales arnaques et fraudes en ligne et comment s'en protéger ; la protection de ses canaux de communication (box, VPN, etc.) ; la sécurisation de ses moyens de communication sur Internet ; la conservation de son matériel informatique ; l'anticipation des menaces et la sauvegarde de ses données. Grâce à son écriture simple, accessible et à de nombreuses mises en situation, ce livre pratique rend compréhensibles les subtilités techniques de notre monde numérique.
Choose an application
Computer networks are the spinal cord of our civilisation; because of the huge stakes involved, universities and certain companies must now teach the basics of computer system security. The purpose of this book is to help people learn about the fundamentals of this field through the study of solved exercices. The primary goal is not to create experts in this domain, but rather to teach the concepts required to understand the risks and consequences of computer system misuse. This book thus handles the basic aspects of computer security, including e-mail; viruses and antivirus programs; program and network vulnerabilities; fire walls, address translation and filtering; cryptography; secure communications; secure applications; and security management.This work is a novel addition to the literature in that it gives, for each subject, a short summary of the main principles followed by a series of exercises (with solutions), resulting in a self-contained book that provides a solid foundation in computer security to students. Chapters in this book have been conceived to be as independent as possible. All of them, nevertheless, require a background in computer science and a familiarity with the most common network protocols. [Publisher]
Computer security. --- Sécurité informatique --- Computer security --- Computer systems --- Data protection --- Systèmes informatiques --- Protection de l'information (informatique) --- Safety measures --- Mesures de sécurité --- Sécurité informatique --- Safety measures. --- Mesures de sécurité. --- Systèmes informatiques --- Mesures de sécurité.
Choose an application
Choose an application
Choose an application
Ergodic theory. Information theory --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- cryptografie --- cryptologie --- computerbesturingssystemen --- datacommunicatie --- programmatielogica --- OS (operating system) --- computernetwerken --- informatietheorie
Listing 1 - 6 of 6 |
Sort by
|