Search alternatives:
cipher » ciphers

1
by Konheim, Alan G.
Published 2007
Wiley-Interscience
Table of Contents: ... SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE...

2
by Khlebnikov, Alexei
Published 2022
Packt Publishing, Limited
Table of Contents: ...Other block cipher operation modes -- Choosing the block cipher operation mode -- Padding for block...

3
by Coleman, David D.
Published 2010
Wiley Pub.
Table of Contents: ... Security; Chapter 3: Encryption Ciphers and Methods; Chapter 4: Enterprise 802.11 Layer 2 Authentication...

4
by Vora, Zeal
Published 2017
Packt Publishing
Table of Contents: ... exchange -- Change cipher spec -- Security related to SSL/TLS -- Grading TLS configuration with SSL Labs...

5
by Bishop, Matt, Sullivan, Elisabeth, Ruppel, Michelle
Published 2019
Addison-Wesley
Table of Contents: ...: Cryptography: Basic Cryptography -- Key Management -- Cipher Techniques -- Authentication -- Part V...

6
by Conrad, Eric, Misenar, Seth, Feldman, Joshua
Published 2023
Syngress
Table of Contents: ... Ciphers -- Modular Math -- Exclusive Or (XOR) -- Data at Rest and Data in Motion -- Protocol Governance...

7
by Mukherjee, Aditya
Published 2020
Packt Publishing, Limited
Table of Contents: ... -- Network security -- Internet protection -- Virtual networks -- Network integrations -- Cipher...

8
by Schou, Corey
Published 2015
McGraw-Hill Education
Table of Contents: ... -- Cryptology -- Codes and Ciphers -- Further Reading -- Critical Thinking Exercises -- Chapter 5 Organizations...

9
by Crist, Eric F.
Published 2017
Packt Publishing
Table of Contents: ...: Performance -- Networking -- Rate limiting -- Cryptographic performance -- Library differences -- Cipher...

10
by Orzach, Yoram
Published 2022
Packt Publishing Limited
Table of Contents: ... versus block ciphers -- Symmetric versus asymmetric encryption -- Public key infrastructure...

11
by Chebbi, Chiheb
Published 2018
Packt Publishing
Table of Contents: ... -- Summary -- Chapter 10: Insecure VPN Exploitation -- Cryptography -- Cryptosystems -- Ciphers -- Classical...

12
by Nath, Anish
Published 2015
Packt Publishing
Table of Contents: ... Cipher Spec -- Finished -- Application Data -- Alert Protocol -- Key exchange -- The Diffie-Hellman key...

13
by Buchanan, Cameron
Published 2014
Packt Pub.
Table of Contents: ... encoding types -- Scenario 2 -- encode + Python = merry hell -- Setup -- Substitution cipher variations...

14
by Butler, Tim
Published 2017
Packt Publishing
Table of Contents: ... it... -- Logging TLS mode and cipher information -- How to do it... -- Logging POST data -- How to do...

15 Table of Contents: ... Information -- Chapter 5 Review -- Chapter 6 Applied Cryptography -- Cryptography Use -- Cipher Suites...

16
by Calderon, Paulino
Published 2017
Packt Publishing
Table of Contents: ... systems -- Auditing the strength of cipher suites in SSL servers -- How to do it... -- How it works...

17
by Ahmad, David R. Mirza
Published 2002
Syngress
Table of Contents: ...> Understanding Amateur Cryptography Attempts</br><br> Classifying the Ciphertext</br><br> Monoalphabetic Ciphers...

18
by Messier, Ric
Published 2021
Sybex, a Wiley brand
Table of Contents: ... -- Review Questions 510 -- Chapter 13 Cryptography 515 -- Basic Encryption 517 -- Substitution Ciphers 517...

19
by Snader, Jon C.
Published 2005
Addison-Wesley
... topics covered include: Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers...