• Ebook CEH - TM - Official certified ethical hacker review guide: Part 1

    Ebook CEH - TM - Official certified ethical hacker review guide: Part 1

    Part 1 book "CEH - TM - Official certified ethical hacker review guide" has contents: Introduction to ethical hacking, ethics, and legality; footprinting and social engineering; scanning and enumeration; trojans, backdoors, viruses, and worms; trojans, backdoors, viruses, and worms.

     133 p hiu 27/08/2019 26 0

  • Ebook CEH - TM - Official certified ethical hacker review guide: Part 2

    Ebook CEH - TM - Official certified ethical hacker review guide: Part 2

    Part 2 book "CEH - TM - Official certified ethical hacker review guide" has contents: Sniffers, denial of service and session hijacking; hacking web servers, web application vulnerabilities, and web based password cracking techniques; SQL injection and buffer overflows; wireless hacking; physical security,...and other contents.

     132 p hiu 27/08/2019 29 0

  • Ebook Cryptography engineering: Part 2

    Ebook Cryptography engineering: Part 2

    Part 2 book "Cryptography engineering" has contents: Primes, Diffie-Hellman, introduction to cryptographic protocols, key negotiation, implementation issue, the clock, key servers, the dream of PKi, storing secrets, storing secrets,... and other contents.

     191 p hiu 26/08/2019 49 0

  • Ebook Cryptography engineering: Part 1

    Ebook Cryptography engineering: Part 1

    (BQ) Part 1 book "Cryptography engineering" has contents: The context of cryptography, introduction to cryptography, block ciphers, block cipher modes, hash functions, message authentication codes, the secure channel, implementation issues, implementation issues.

     191 p hiu 26/08/2019 48 0

  • Ebook Introduction to modern cryptography: Part 1

    Ebook Introduction to modern cryptography: Part 1

    (BQ) Part 1 book "Introduction to modern cryptography" has contents: Introduction and classical cryptography, perfectly secret encryption; message authentication codes and collision resistant hash functions, practical constructions of pseudorandom permutations,...and other contents.

     259 p hiu 26/08/2019 64 0

  • Ebook Introduction to modern cryptography: Part 2

    Ebook Introduction to modern cryptography: Part 2

    (BQ) Part 2 book "Introduction to modern cryptography" has contents: Number theory and cryptographic hardness assumptions, factoring and computing discrete logarithms, private key management and the public key revolution, digital signature schemes,....and other contents.

     294 p hiu 26/08/2019 68 0

  • Ebook Understanding cryptography

    Ebook Understanding cryptography

    Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. This book addresses this issue by providing a...

     382 p hiu 26/08/2019 44 0

  • Ebook Hacking exposed: Network security secrets and solutions (Third edition)

    Ebook Hacking exposed: Network security secrets and solutions (Third edition)

    (BQ)Typically, these actors attempt to exploit flaws in the system implementation or its deployment in order to obtain information, acquire access to services, or simply to disrupt the operation of the cloud through loss of system availability or system and information integrity. As the description of these attacks implies some of these attacks violate the tenant boundaries and hardware abstraction layers that VMware vCloud Director attempts...

     260 p hiu 26/08/2019 48 0

  • Ebook Network Security Essentials: Applications and Standards (4th Edition) - William Stallings

    Ebook Network Security Essentials: Applications and Standards (4th Edition) - William Stallings

    (BQ) Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition.

     432 p hiu 26/08/2019 43 0





Hướng dẫn khai thác thư viện số

Hổ trợ trực tuyến

Yahoo Messenger

Trương Minh Hoài

Email: hoaitm@hiu.vn

ĐT: 0938084083