Cryptography has crept into everything, from Web browsers and e-mail programs to cell phones, bank cards, cars and even into medical implants. In the near fu- ture we will see many new exciting applications for cryptography such as radio frequency identification (RFID) tags for anti-counterfeiting or car-to-car commu- nications (we’ve worked on securing both of these applications). This is quite a change from the past, where cryptography had been traditionally confined to very specific applications, especially government communications and banking systems. As a consequence of the pervasiveness of crypto algorithms, an increasing number of people must understand how they work and how they can be applied in prac- tice. This book addresses this issue by providing a comprehensive introduction to modern applied cryptography that is equally suited for students and practitioners in industry.
2021-09-02 09:39:35 7.01MB cybersecurity
1
信息安全_数据安全_Women_in_Cybersecurity:Finding,_ 信息安全 云安全 业务风控 安全开发 安全测试
2021-08-23 13:00:50 2.48MB 安全架构 安全实践 金融安全 威胁情报
信息安全_数据安全_解讀 NIST Cybersecurity Framework: AI 安全防护 安全建设 法律法规 系统安全
tv-t01-the-new-geopolitics-of-cybersecurity-research.pdf
2021-08-22 13:01:10 1.45MB 安全
信息安全_数据安全_Cybersecurity Tips Tools and Tec 应用审计 风控 应急响应 安全实践 漏洞挖掘
2021-08-21 22:00:33 3.53MB 可信计算 安全现状 安全威胁 云数据库
信息安全_数据安全_Cybersecurity_Silo-Busters:1_Cyb 安全防护 数据脱敏 数字风险 金融安全 安全评级
2021-08-21 22:00:31 2.59MB 安全研究 数字取证 内网安全 安全分析
信息安全_数据安全_Cybersecurity’s_Dirty_Little_Sec 可信计算 安全架构 安全审计 业务安全 可信编译
2021-08-21 22:00:30 10.13MB 风险分析 安全行业 安全体系 漏洞分析
信息安全_数据安全_Cybersecurity:Federalism_as_Defe 安全运营 安全工作 安全对抗 安全编码 企业安全
2021-08-21 22:00:29 3.26MB 安全加固 企业安全 漏洞管理 安全防护
企業如何活用 Cybersecurity Framework 可信编译 安全行业 网络安全 安全建设 云安全
2021-08-21 19:00:14 1.79MB 安全编码 应急响应 APT 威胁检测
美国能源部2021版成熟度模型,Cybersecurity capability maturity model(C2M2),Version 2.0 July 2021
2021-08-17 13:00:41 1.61MB 美国能源部 网络安全 能力成熟度
1