Results 1 to 10 of 16 | next »
- The manga guide to cryptography / by Mitani, Masaaki,author.(CARDINAL)803923; Hinoki, Idero,artist.(CARDINAL)803925; Sato, Shinichi(Professor of engineering),author.(CARDINAL)803924; Verte Corp.,author.(CARDINAL)502851;
The foundations of encryption -- Symmetric-key algorithms -- Public-key encryption -- Practical applications of encryption."A manga comic-based introduction to cryptography, including ciphers, symmetric-key algorithms, and public key encryption. An English translation of the Japanese original"--
- Subjects: Comics (Graphic works); Graphic novels.; Public key cryptography; Telecommunication;
- Available copies: 1 / Total copies: 2
-
unAPI
- Discrete mathematics [videorecording] / by Benjamin, Arthur.(CARDINAL)362888; Teaching Company.(CARDINAL)349444;
Course workbook includes professor biography, acknowledgments, statement of course scope, lecture outline with suggested readings and questions to consider, timeline, glossary, biographical notes, and bibliography.Producer, Matt Costanza ; academic content supervisor, Jay Tate ; editors, Dan Shine, Zach Rhodes.Twenty-four thirty minute lectures by Dr. Arthur T. Benjamin, Professor of Mathematics at Harvey Mudd College.Discrete mathematics is a subject that--while off the beaten track--has vital applications in computer science, cryptography, engineering, and problem solving of all types. Discrete mathematics deals with quantities that can be broken into neat little pieces, like pixels on a computer screen, the letters or numbers in a password, or directions on how to drive from one place to another. Like a digital watch, discrete mathematics is that in which numbers proceed one at a time, resulting in fascinating mathematical results using relatively simple means, such as counting. This course delves into three of Discrete Mathematics most important fields: Combinatorics (the mathematics of counting), Number theory (the study of the whole numbers), and Graph theory (the relationship between objects in the most abstract sense). Professor Benjamin presents a generous selection of problems, proofs, and applications for the wide range of subjects and foci that are Discrete Mathematics.DVD.
- Subjects: Lectures.; Nonfiction films.; Educational films.; Video recordings.; Mathematics.; Combinatorial analysis.; Binomial coefficients.; Fibonacci numbers.; Factorials.; Fermat's last theorem.; Numbers, Prime.; Groups of divisibility.; Public key cryptography.; Matrices.; Markov processes.; Trees (Graph theory); Ramsey theory.; Computer science;
- Available copies: 2 / Total copies: 2
-
unAPI
- Cracking codes with Python : an introduction to building and breaking ciphers / by Sweigart, Al,author.;
Making paper cryptography tools -- Installing Python -- Programming in the interactive shell -- Strings and writing programs -- The reverse cipher -- The Caesar Cipher -- Hacking the Caesar Cipher with the brute-force technique -- Encrypting with the transposition cipher -- Decrypting with the transposition cipher -- Programming a program to test your program -- Encrypting and decrypting files -- Detecting English programmatically -- Hacking the transposition cipher -- Making a modular arithmetic module for the multiplicative and affine ciphers -- Programming the affine cipher -- Hacking the affine cipher -- The simple substitution cipher -- Hacking the simple substitution cipher -- Programming the vigenere cipher -- Frequency analysis -- Hacking the vigenere cipher -- The one-time pad cipher -- Finding prime numbers -- Generating keys for the RSA cipher -- Public key cryptography and programming the RSA cipher."Presents a crash course in Python programming, followed by instructions for making, testing, and hacking classic cipher programs, from the Caesar cipher to public key cryptography and the RSA cipher"--1150L
- Subjects: Data encryption (Computer science); Python (Computer program language); Computer security.; Hacking.;
- Available copies: 1 / Total copies: 2
-
unAPI
- Cryptography : cracking codes / by Curley, Robert,1955-(CARDINAL)497361;
Includes bibliographical references (page 77) and index.Introduction -- Cryptography, cryptanalysis, and cryptology -- The fundamentals of codes, ciphers, and authentication -- Cryptology in private and commercial life -- Cipher systems -- Transposition ciphers -- Substitution ciphers -- Playfair ciphers -- Vigenère ciphers -- Vernam-vigenère ciphers -- Product ciphers -- Key systems and block and stream ciphers -- Single-key cryptography -- Two-key cryptography -- Public-key cryptography -- Secret-sharing -- RSA encryption -- Block and stream ciphers -- Cryptanalysis -- Basic aspects -- Types of cryptanalysis -- Early manual and mechanical cryptography -- The first systems -- World wars I and II -- Modern electronic cryptography -- The impact of electronics -- DES and AES -- Conclusion.
- Subjects: Young adult literature.; Young adult literature.; Cryptography; Data encryption (Computer science);
- Available copies: 2 / Total copies: 2
-
unAPI
- The electronic privacy papers : documents on the battle for privacy in the age of surveillance / by Schneier, Bruce,1963-(CARDINAL)207429; Banisar, David.(CARDINAL)210917;
Includes bibliographical references (pages 729-734) and indexes.Privacy and the Information Snooperhighway -- Roadblocks on the Information Superhighway -- Wiretapping -- Overview of Wiretapping -- Lobbying for Surveillance: the Digital Telephony Proposal -- Digital Telephony: The Public Response -- Cryptography -- Cryptography: The Cure for the Common Bug -- The Battle for Control of Cryptography -- Early Skirmishes -- The Clipper Chip Proposal -- Clipping the Clipper: Public Response to Desktop Surveillance -- Putting the Genie Back in the Bottle: Export Controls on Cryptography -- Atom Bombs, Fighter Planes, Machines Guns, and Cryptography: Export Controls -- Big Brother As the Keeper of the Keys: Will the Government Take Over Crypto? -- Banning Cryptography -- Software Key Escrow -- Epilogue.
- Subjects: Privacy, Right of; Computer security; Data encryption (Computer science); Wiretapping;
- Available copies: 1 / Total copies: 1
- On-line resources: Suggest title for digitization;
-
unAPI
- CompTIA Security+ certification study guide (exam SY0-401) / by Clarke, Glen E.,author.(CARDINAL)543358;
Networking basics and terminology -- Introduction to security terminology -- Security policies and standards -- Types of attacks -- System security threats -- Mitigating security threats -- Implementing system security -- Securing the network infrastructure -- Wireless networking and security -- Authentication -- Access control -- Introduction to cryptography -- Managing a public key infrastructure -- Physical security -- Risk analysis -- Disaster recovery and business continuity -- Introduction to computer forensics -- Security assessments and audits -- Understanding monitoring and auditing.With hundreds of practice exam questions, including new performance-based questions, this second edition covers what you need to know--and shows you how to prepare--for this challenging exam. It has 100% complete coverage of all official objectives for exam SY0-401; Exam Watch notes call attention to information about, and potential pitfalls in, the exam; inside the exam sections in every chapter highlight key exam topics covered; two-minute drills for quick review at the end of every chapter; simulated exam questions--including performance-based questions--match the format, topics, and difficulty of the real exam. --
- Subjects: Study guides.; Computer security; Computer networks; Electronic data processing personnel;
- Available copies: 1 / Total copies: 1
-
unAPI
- In code : a mathematical journey / by Flannery, Sarah,1982-(CARDINAL)702724; Flannery, David,1952-(CARDINAL)702726;
Includes bibliographical references (page 323) and index.
- Subjects: Autobiographies.; Flannery, Sarah, 1982-; Coding theory.; Mathematicians;
- Available copies: 2 / Total copies: 2
-
unAPI
- In code : a mathematical journey / by Flannery, Sarah,1982-(CARDINAL)702724; Flannery, David,1952-(CARDINAL)702726;
Includes bibliographical references (page 323) and index.
- Subjects: Autobiographies.; Flannery, Sarah, 1982-; Coding theory.; Mathematicians;
- Available copies: 3 / Total copies: 3
-
unAPI
- Comptia® Security+® Study Guide : exam sy0-601 / by Chapple, Mike,author.(CARDINAL)866726; Seidl, David,author.(CARDINAL)866704;
Includes index.Chapter 1. Today's Security Professional -- Chapter 2. Cybersecurity Threat Landscape -- Chapter 3. Malicious Code -- Chapter 4. Social Engineering, Physical, and Password Attacks -- Chapter 5. Security Assessment and Testing -- Chapter 6. Secure Coding -- Chapter 7. Cryptography and the Public Key Infrastructure -- Chapter 8. Identity and Access Management -- Chapter 9. Resilience and Physical Security -- Chapter 10. Cloud and Virtualization Security -- Chapter 11. Endpoint Security -- Chapter 12. Network Security -- Chapter 13. Wireless and Mobile Security -- Chapter 14. Incident Response -- Chapter 15. Digital Forensics -- Chapter 16. Security Policies, Standards, and Compliance -- Chapter 17. Risk Management and Privacy -- Answers to Review Questions."The Eighth Edition of the CompTIA Security+ Study Guide Exam SY0-601 efficiently and comprehensively prepares you for the SY0-601 Exam. Accomplished authors and security experts Mike Chapple and David Seidl walk you through the fundamentals of crucial security topics, including the five domains covered by the SY0-601 Exam: Attacks, Threats, and Vulnerabilities, Architecture and Design, Implementation, Operations and Incident Response, Governance, Risk, and Compliance. The study guide comes with the Sybex online, interactive learning environment that includes a pre-assessment test, hundreds of review questions, practice exams, flashcards, and a glossary of key terms."--Amazon
- Subjects: Study guides.; Computer networks; Computer networks; Computer security; Electronic data processing personnel.;
- Available copies: 1 / Total copies: 2
-
unAPI
- Nine algorithms that changed the future : the ingenious ideas that drive today's computers / by MacCormick, John,1972-(CARDINAL)667253;
Includes bibliographical references and index.Every day, we use our computers to perform remarkable feats. A simple web search picks out a handful of relevant needles from the world's biggest haystack: the billions of pages on the World Wide Web. Uploading a photo to Facebook transmits millions of pieces of information over numerous error-prone network links, yet somehow a perfect copy of the photo arrives intact. Without even knowing it, we use public-key cryptography to transmit secret information like credit card numbers; and we use digital signatures to verify the identity of the websites we visit. How do our computers perform these tasks with such ease? This is the first book to answer that question in language anyone can understand, revealing the extraordinary ideas that power our PCs, laptops, and smartphones. Using vivid examples, John MacCormick explains the fundamental "tricks" behind nine types of computer algorithms, including artificial intelligence (where we learn about the "nearest neighbor trick" and "twenty questions trick"), Google's famous PageRank algorithm (which uses the "random surfer trick"), data compression, error correction, and much more. These revolutionary algorithms have changed our world: this book unlocks their secrets, and lays bare the incredible ideas that our computers use every day.
- Subjects: Computer science.; Computer algorithms.; Artificial intelligence.;
- Available copies: 1 / Total copies: 1
-
unAPI
Results 1 to 10 of 16 | next »