This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature...
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them...
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and...
The fourth edition of the Official (ISC)2® Guide to the SSCP CBK® is a comprehensive resource providing an in-depth look at the seven domains of the...
Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent...
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project...