Sold Out
Book Categories |
1 | Introduction | 1 |
2 | Crypto basics | 11 |
3 | Symmetric key Crypto | 33 |
4 | Public key Crypto | 61 |
5 | Hash functions and other topics | 85 |
6 | Advanced cryptanalysis | 109 |
7 | Authentication | 153 |
8 | Authorization | 177 |
9 | Simple authentication protocols | 209 |
10 | Real-world security protocols | 235 |
11 | Software flaws and malware | 267 |
12 | Insecurity in software | 295 |
13 | Operating systems and security | 325 |
App. 1 | Network security basics | 341 |
App. 2 | Math essentials | 351 |
App. 3 | DES S-boxes | 355 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionInformation Security: Principles and Practice - 2nd Edition
X
This Item is in Your InventoryInformation Security: Principles and Practice - 2nd Edition
X
You must be logged in to review the productsX
X
X
Add Information Security: Principles and Practice - 2nd Edition, As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by , Information Security: Principles and Practice - 2nd Edition to the inventory that you are selling on WonderClubX
X
Add Information Security: Principles and Practice - 2nd Edition, As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by , Information Security: Principles and Practice - 2nd Edition to your collection on WonderClub |