Lendle

Cover Book Actions
Explanations and Advice for ... - Randall Morris
 

Explanations and Advice for ...Randall Morris

Average wait: N/A

This series of explanations and articles breaks down some commonly misunderstood elements of computers and home theater. Explanations are given in a basic, understandable way (without sounding too “techy.”) Topics include: basic computer ty… more

Explanations and Advice for the Tech Illiterate
Randall Morris
English
PC Security Guide - PTAJ Marketing Inc.
 

PC Security GuidePTAJ Marketing Inc.

Want to keep your computer safe from Virus’, Spyware, Spam and other nasty threats? Is your computer just running too slow, and you want to speed it up? We can help.Learn about:Identity TheftBotnetsVirusesSecurity RulesEncryptionTrojan Hors… more

PC Security Guide
PTAJ Marketing Inc.
PTAJ Marketing Inc. , English
The SPICE KING - Don  La Rue
 

The SPICE KINGDon La Rue

Average wait: N/A

War between Columbian Drug Cartel and Silicon Valley INTAGLIO Encryption geniuses ” Abe’s Kids.”

The SPICE KING
Don La Rue
Don La Rue , English
Resistance to Tyranny: A Primer - Joseph Martino
 

Resistance to Tyranny: A PrimerJoseph Martino

Average wait: N/A

This book is a primer on armed revolt. It is not intended to cover the subject in detail. It is intended to introduce readers things they might not have thought of, provide them with a brief presentation of the topic, and lead them to sourc… more

Resistance to Tyranny: A Primer
Joseph Martino
CreateSpace , English
Information Security - Muhammad Adeel Javaid
 

Information SecurityMuhammad Adeel Javaid

As we know that computer security involves safeguarding computing resources, ensuring data integrity, limiting access to authorized users, and maintaining data confidentiality. Effective computer security therefore involves taking physical … more

Information Security
Muhammad Adeel Javaid
English
Hand Encryption - John Livingstone
 

Hand EncryptionJohn Livingstone

Average wait: N/A

Four methods of encryption with pen and paper

Hand Encryption
John Livingstone
English
Querying over Encrypted Data... - Mi Wen, Rongxing Lu, Xiaohui...
 

Querying over Encrypted Data...Mi Wen, Rongxing Lu, Xiaohui...

This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challe… more

Querying over Encrypted Data in Smart Grids (SpringerBriefs in Computer Science)
Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen
Springer , English
What dimensions do digital s... - Kurt Grashaw
 

What dimensions do digital s...Kurt Grashaw

Average wait: N/A

Although encryption methods still posses limitations and potential flaws, they have dramatically increased the security of data transfer on the Internet. The use of hash functions and digital signatures has been a driving force in addressin… more

What dimensions do digital signatures and hash digests add to public key encryption and how do they work?
Kurt Grashaw
Kurt Grashaw , English
Discrete Mathematics for Com... - Kenneth Bogart, Clifford Ste...
 

Discrete Mathematics for Com...Kenneth Bogart, Clifford Ste...

Average wait: N/A

Discrete Mathematics for Computer Science” is the perfect text to combine the fields of mathematics and computer science. Written by leading academics in the field of computer science, readers will gain the skills needed to write and under… more

Discrete Mathematics for Computer Science (Mathematics Across the Curriculum)
Kenneth Bogart, Clifford Stein, Robert L. Drysdale
Key College Publishing , English
Fast Software Encryption: 6t... -
 

Fast Software Encryption: 6t...

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Fast Software Encryption, FSE‘99, held in Rome, Italy, in March 1999. The 22 revised full papers presented were carefully selected … more

Fast Software Encryption: 6th International Workshop, FSE‘99 Rome, Italy, March 24-26, 1999 Proceedings: International Workshop, FSE ‘99, Rome, Italy, Marc (Lecture Notes in Computer Science)
Springer , English
Advanced Encryption Standard... -
 

Advanced Encryption Standard...

This book constítutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held in Bonn, Germany in May 2004.The 10 revised full papers presented together with an introdu… more

Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers (Lecture … Computer Science / Security and Cryptology)
Springer , English
Take Control of Apple Mail i... - Joe Kissell
 

Take Control of Apple Mail i...Joe Kissell

Are you using Apple Mail in Snow Leopard effectively? In this book, author Joe Kissell provides comprehensive guidance. Perhaps you just want to fully understand the basics of receiving, composing, and sending email. Or maybe you want to ma… more

Take Control of Apple Mail in Snow Leopard
Joe Kissell
TidBITS Publishing, Inc. , English
A Practical Guide to Securit... - Debra S. Herrmann
 

A Practical Guide to Securit...Debra S. Herrmann

Today the vast majority of the world’s information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore,… more

A Practical Guide to Security Engineering and Information Assurance
Debra S. Herrmann
Auerbach Publications , English
Cryptography For Dummies - Chey Cobb
 

Cryptography For DummiesChey Cobb

Average wait: N/A

Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and bankingThis invaluable introduction to the basics of encryption covers everything from the… more

Cryptography For Dummies
Chey Cobb
For Dummies , English
About Encryption and Making ... - Anonymous
 

About Encryption and Making ...Anonymous

Encryption and cryptographic software has been used in many different ways to make systems more secure. This article discusses only a few ways that such software can make your system more secure, including:1) Encrypting your email2) Encryp… more

About Encryption and Making Your System Secure
Anonymous
English
Encryption in a Windows Envi... - Rand Morimoto
 

Encryption in a Windows Envi...Rand Morimoto

This is the eBook version of the printed book. With the current business, government, and institutional focus on security, organizations are scrambling to make their networks more secure. Although encryption is nothing new to Windows,… more

Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange (Short Cut)
Rand Morimoto
Sams Publishing , English
Data Privacy and Security: E... - David Salomon
 

Data Privacy and Security: E...David Salomon

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover,… more

Data Privacy and Security: Encryption and Information Hiding (Signal Processing and Digital Filtering)
David Salomon
Springer , English
Fast Software Encryption: Se... -
 

Fast Software Encryption: Se...

This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994.The 28 papers presented significantly advance the… more

Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 14-16, 1994. Proceedings (Lecture Notes in Computer Science)
Springer , English
Ruthless.com: Power Plays 02 - Tom Clancy, Martin H. Greenb...
 

Ruthless.com: Power Plays 02Tom Clancy, Martin H. Greenb...

Encryption technology keeps the codes for the world’s security and communication systems top secret. Deregulating this state-of-the-art technology for export could put a back-door key in the pockets of spies and terrorists around the world… more

Ruthless.com: Power Plays 02
Tom Clancy, Martin H. Greenberg, Jerome Preisler
Berkley , English
Exhortacion Concerning Good ... - Claude Philogène
 

Exhortacion Concerning Good ...Claude Philogène

Average wait: N/A

This play has been written using the structure of the classical japanese nô theatre. The main actor is a griot (a travelling storyteller), speaking in the Pakala dialect of creole computer Cant (a style of expression, where different langua… more

Exhortacion Concerning Good Order & Obedience to Rulers & Magistrates
Claude Philogène
Nôka Publishing, Stockholm, Sweden , English