Titel, Artikelname, Autor:
in 
Bücher Elektronik, Foto
Musik-CDs DVDs, Blu-ray
Spielzeug Software
Freizeit, Sport Haus und Garten
Computerspiele Küchengeräte
Essen und Trinken Drogerie und Bad
Inhaltsangaben
Kurzbeschreibungen
Zusammenfassungen

Buch, Hörbücher:

Internet-Kryptografie

Seite 3
Web Application Security: Exploitation and Countermeasures for Modern Web Applications - Andrew Hoffman

Web Application Security: Exploitation and Countermeasures for Modern Web Applications

Autor: Andrew Hoffman

Taschenbuch, 27.02.2024
Weiterinformieren oder bestellen


Krypto-Mining für Dummies - Peter Kent, Tyler Bain Übersetzer: Isolde Kommer

Krypto-Mining für Dummies

Autoren: Peter Kent, Tyler Bain
Übersetzer: Isolde Kommer

Taschenbuch, 30.11.2022
Weiterinformieren oder bestellen


Python Tools for Scientists: An Introduction to Using Anaconda, JupyterLab, and Python's Scientific Libraries - Lee Vaughan

Python Tools for Scientists: An Introduction to Using Anaconda, JupyterLab, and Python's Scientific Libraries

Autor: Lee Vaughan

Taschenbuch, 17.01.2023
Weiterinformieren oder bestellen


Quantum Computing verstehen: Grundlagen – Anwendungen – Perspektiven (Computational Intelligence) - Matthias Homeister

Quantum Computing verstehen: Grundlagen – Anwendungen – Perspektiven (Computational Intelligence)

Autor: Matthias Homeister

Taschenbuch, 05.02.2022
Weiterinformieren oder bestellen


CompTIA PenTest+ Study Guide: Exam PT0-002 (Sybex Study Guide) - Mike Chapple, David Seidl

CompTIA PenTest+ Study Guide: Exam PT0-002 (Sybex Study Guide)

Autoren: Mike Chapple, David Seidl

Taschenbuch, 20.12.2021
Weiterinformieren oder bestellen


Kryptografie für Dummies - Hans Werner Lang

Kryptografie für Dummies

Autor: Hans Werner Lang

Taschenbuch, 12.04.2023
Weiterinformieren oder bestellen


IT-Sicherheit: Konzepte – Verfahren – Protokolle (De Gruyter Studium) - Claudia Eckert

IT-Sicherheit: Konzepte – Verfahren – Protokolle (De Gruyter Studium)

Autor: Claudia Eckert

Gebundene Ausgabe, 20.02.2023
Weiterinformieren oder bestellen


Passwort Buch: Deutsch Passwörterbuch mit Register A-Z (Mehr als 500 Passwörter Verwalten) - Max Securerstein

Passwort Buch: Deutsch Passwörterbuch mit Register A-Z (Mehr als 500 Passwörter Verwalten)

Autor: Max Securerstein

Taschenbuch, 02.02.2024
Weiterinformieren oder bestellen


Kryptografie: Verfahren, Protokolle, Infrastrukturen (iX-Edition) - Klaus Schmeh

Kryptografie: Verfahren, Protokolle, Infrastrukturen (iX-Edition)

Klaus Schmeh

Gebundene Ausgabe
Weiterinformieren oder bestellen


OAuth 2 in Action - Justin Richer, Antonio Sanso

OAuth 2 in Action

Justin Richer, Antonio Sanso

Taschenbuch
Weiterinformieren oder bestellen


Programming Bitcoin: Learn How to Program Bitcoin from Scratch - Jimmy Song

Programming Bitcoin: Learn How to Program Bitcoin from Scratch

Jimmy Song

Taschenbuch
Weiterinformieren oder bestellen


A Real-Time In-Memory Discovery Service: Leveraging Hierarchical Packaging Information in a Unique Identifier Network to Retrieve Track and Trace Information (In-Memory Data Management Research) - Jürgen Müller

A Real-Time In-Memory Discovery Service: Leveraging Hierarchical Packaging Information in a Unique Identifier Network to Retrieve Track and Trace Information (In-Memory Data Management Research)

Jürgen Müller

Gebundene Ausgabe
Weiterinformieren oder bestellen


Blockchain Basics: A Non-Technical Introduction in 25 Steps - Daniel Drescher

Blockchain Basics: A Non-Technical Introduction in 25 Steps

Daniel Drescher

Taschenbuch
Weiterinformieren oder bestellen


Die neue Datenschutz-Grundverordnung: Mit Bundesdatenschutzgesetz 2018 (De Gruyter Praxishandbuch)

Die neue Datenschutz-Grundverordnung: Mit Bundesdatenschutzgesetz 2018 (De Gruyter Praxishandbuch)

Gebundene Ausgabe
Weiterinformieren oder bestellen


CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition - Matt Walker

CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition

Matt Walker

Taschenbuch
Weiterinformieren oder bestellen


Algorithmic Number Theory: 6th International Symposium, ANTS-VI, Burlington, VT, USA, June 13-18, 2004, Proceedings (Lecture Notes in Computer Science (3076), Band 3076)

Algorithmic Number Theory: 6th International Symposium, ANTS-VI, Burlington, VT, USA, June 13-18, 2004, Proceedings (Lecture Notes in Computer Science (3076), Band 3076)

Taschenbuch
Weiterinformieren oder bestellen


The Code Book: Science of Secrecy from Ancient Egypt to Quantum Cryptography - Simon Singh

The Code Book: Science of Secrecy from Ancient Egypt to Quantum Cryptography

Simon Singh

Taschenbuch
Weiterinformieren oder bestellen

People love secrets. Ever since the first word was written, humans have sent coded messages to each other. In < I> The Code Book, Simon Singh, author of the bestselling < I> Fermat's Enigma, offers a peek into the world of cryptography and codes, from ancient texts through computer encryption. Singh's compelling history is woven through with stories of how codes and ciphers have played a vital role in warfare, politics, and royal intrigue. The major theme of < I> The Code Book is what Singh calls "the ongoing evolutionary battle between codemakers and codebreakers, " never more clear than in the chapters devoted to World War  I I. Cryptography came of age during that conflict, as secret communications became critical to both sides' success.

Confronted with the prospect of defeat, the Allied cryptanalysts had worked night and day to penetrate German ciphers. It would appear that fear was the main driving force, and that adversity is one of the foundations of successful codebreaking.

In the information age, the fear that drives cryptographic improvements is both capitalistic and libertarian-corporations need encryption to ensure that their secrets don't fall into the hands of competitors and regulators, and ordinary people need encryption to keep their everyday communications private in a free society. Similarly, the battles for greater decryption power come from said competitors and governments wary of insurrection.

< I> The Code Book is an excellent primer for those wishing to understand how the human need for privacy has manifested itself through cryptography. Singh's accessible style and clear explanations of complex algorithms cut through the arcane mathematical details without oversimplifying. < I>-Therese Littleton


Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation - James Forshaw

Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation

James Forshaw

Taschenbuch
Weiterinformieren oder bestellen


Broken Money: Why Our Financial System is Failing Us and How We Can Make it Better (English Edition) - Lyn Alden

Broken Money: Why Our Financial System is Failing Us and How We Can Make it Better (English Edition)

Autor: Lyn Alden

Kindle eBook und andere Ausgaben
Weiterinformieren oder bestellen


Buch, Hörbücher: Kryptografie
Weitere Seiten:
Internet-Kryptografie, Vorige Seite
 1      2      3      4      5      6      7      8      9      10    
Internet-Kryptografie, Nächste Seite


Buch, Hörbücher: Internet-Kryptografie
Buch, Hörbücher
Computer und Internet
PC- und Internetsicherheit

Kryptografie



04.03.2024  19