Lendle

Cover Book Actions
Resistance to Tyranny: A Primer - Joseph Martino
 

Resistance to Tyranny: A PrimerJoseph Martino

Average wait: N/A

This book is a primer on armed revolt. It is not intended to cover the subject in detail. It is intended to introduce readers things they might not have thought of, provide them with a brief presentation of the topic, and lead them to sourc… more

Resistance to Tyranny: A Primer
Joseph Martino
CreateSpace , English
The SPICE KING - Don  La Rue
 

The SPICE KINGDon La Rue

Average wait: N/A

War between Columbian Drug Cartel and Silicon Valley INTAGLIO Encryption geniuses ” Abe’s Kids.”

The SPICE KING
Don La Rue
Don La Rue , English
Hand Encryption - John Livingstone
 

Hand EncryptionJohn Livingstone

Average wait: N/A

Four methods of encryption with pen and paper

Hand Encryption
John Livingstone
English
Information Security - Muhammad Adeel Javaid
 

Information SecurityMuhammad Adeel Javaid

As we know that computer security involves safeguarding computing resources, ensuring data integrity, limiting access to authorized users, and maintaining data confidentiality. Effective computer security therefore involves taking physical … more

Information Security
Muhammad Adeel Javaid
English
Explanations and Advice for ... - Randall Morris
 

Explanations and Advice for ...Randall Morris

This series of explanations and articles breaks down some commonly misunderstood elements of computers and home theater. Explanations are given in a basic, understandable way (without sounding too “techy.”) Topics include: basic computer ty… more

Explanations and Advice for the Tech Illiterate
Randall Morris
English
PC Security Guide - PTAJ Marketing Inc.
 

PC Security GuidePTAJ Marketing Inc.

Want to keep your computer safe from Virus’, Spyware, Spam and other nasty threats? Is your computer just running too slow, and you want to speed it up? We can help.Learn about:Identity TheftBotnetsVirusesSecurity RulesEncryptionTrojan Hors… more

PC Security Guide
PTAJ Marketing Inc.
PTAJ Marketing Inc. , English
Update Your Computer Know Ho... - Robert A. Blake
 

Update Your Computer Know Ho...Robert A. Blake

Average wait: N/A

NEW: February 2015 Update on Encryption Software to keep your Information Safe!

This book guides you on how to take control of your entire computer experience from end to end. From what type of computer you should actually buy, including e… more

Update Your Computer Know How (Updated February 2015: Windows 8.1, Windows 8, Windows 7, Windows Vista, Windows XP)
Robert A. Blake
Robert A. Blake , English
What dimensions do digital s... - Kurt Grashaw
 

What dimensions do digital s...Kurt Grashaw

Average wait: N/A

Although encryption methods still posses limitations and potential flaws, they have dramatically increased the security of data transfer on the Internet. The use of hash functions and digital signatures has been a driving force in addressin… more

What dimensions do digital signatures and hash digests add to public key encryption and how do they work?
Kurt Grashaw
Kurt Grashaw , English
Querying over Encrypted Data... - Mi Wen, Rongxing Lu, Xiaohui...
 

Querying over Encrypted Data...Mi Wen, Rongxing Lu, Xiaohui...

This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challe… more

Querying over Encrypted Data in Smart Grids (SpringerBriefs in Computer Science)
Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen
Springer , English
Discrete Mathematics for Com... - Kenneth Bogart, Clifford Ste...
 

Discrete Mathematics for Com...Kenneth Bogart, Clifford Ste...

Average wait: N/A

Discrete Mathematics for Computer Science” is the perfect text to combine the fields of mathematics and computer science. Written by leading academics in the field of computer science, readers will gain the skills needed to write and under… more

Discrete Mathematics for Computer Science (Mathematics Across the Curriculum)
Kenneth Bogart, Clifford Stein, Robert L. Drysdale
Key College Publishing , English
Advanced Encryption Standard... -
 

Advanced Encryption Standard...

This book constítutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held in Bonn, Germany in May 2004.The 10 revised full papers presented together with an introdu… more

Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers (Lecture … Computer Science / Security and Cryptology)
Springer , English
Fast Software Encryption: 6t... -
 

Fast Software Encryption: 6t...

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Fast Software Encryption, FSE‘99, held in Rome, Italy, in March 1999. The 22 revised full papers presented were carefully selected … more

Fast Software Encryption: 6th International Workshop, FSE‘99 Rome, Italy, March 24-26, 1999 Proceedings: International Workshop, FSE ‘99, Rome, Italy, Marc (Lecture Notes in Computer Science)
Springer , English
Cryptography For Dummies - Chey Cobb
 

Cryptography For DummiesChey Cobb

Average wait: N/A

Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking This invaluable introduction to the basics of encryption covers everything from t… more

Cryptography For Dummies
Chey Cobb
For Dummies , English
A Practical Guide to Securit... - Debra S. Herrmann
 

A Practical Guide to Securit...Debra S. Herrmann

Today the vast majority of the world’s information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore,… more

A Practical Guide to Security Engineering and Information Assurance
Debra S. Herrmann
Auerbach Publications , English
About Encryption and Making ... - Anonymous
 

About Encryption and Making ...Anonymous

Encryption and cryptographic software has been used in many different ways to make systems more secure. This article discusses only a few ways that such software can make your system more secure, including:1) Encrypting your email2) Encryp… more

About Encryption and Making Your System Secure
Anonymous
English
Evernote: 15 Killer Ways Eve... - Jake Daniels
 

Evernote: 15 Killer Ways Eve...Jake Daniels

With our everyday hectic work schedules and long working hours, we are often pressed for time and energy. We are left wondering if there is something that can be done to save our precious time, energy and effort so that we can spend our spa… more

Evernote: 15 Killer Ways Evernote Can Improve Your Work & Business Life
Jake Daniels
Mason M , English
Take Control of Apple Mail i... - Joe Kissell
 

Take Control of Apple Mail i...Joe Kissell

Are you using Apple Mail in Snow Leopard effectively? In this book, author Joe Kissell provides comprehensive guidance. Perhaps you just want to fully understand the basics of receiving, composing, and sending email. Or maybe you want to ma… more

Take Control of Apple Mail in Snow Leopard
Joe Kissell
TidBITS Publishing, Inc. , English
Encryption in a Windows Envi... - Rand Morimoto
 

Encryption in a Windows Envi...Rand Morimoto

This is the eBook version of the printed book. With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption is nothing new to Windows,… more

Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange (Short Cut)
Rand Morimoto
Sams Publishing , English
Ruthless.com: Power Plays 02 - Tom Clancy, Martin H. Greenb...
 

Ruthless.com: Power Plays 02Tom Clancy, Martin H. Greenb...

Encryption technology keeps the codes for the world’s security and communication systems top secret. Deregulating this state-of-the-art technology for export could put a back-door key in the pockets of spies and terrorists around the world… more

Ruthless.com: Power Plays 02
Tom Clancy, Martin H. Greenberg, Jerome Preisler
Berkley , English
Evernote: 101 Evernote Hacks... - Jason Bracht
 

Evernote: 101 Evernote Hacks...Jason Bracht

Average wait: N/A

101 Evernote Hacks to Completely Transform Your ProductivityFree Bonus Report 55 Power Habits IncludedDe-Stress, Organize, and Conquer Tasks Using EvernoteEvernote is a wonderful program that is sure to help you organize your life. It can a… more

Evernote: 101 Evernote Hacks! Become An Everyone Ninja And Accomplish Any Goal, Smash Any Task, And Crush Life (Evernote - Your Complete Guide to Mastering … - Evernote for Beginners - Evernote App)
Jason Bracht
English