Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 170
- Computer Science 147
- Development 104
- Application software 90
- Computer software 52
- Artificial intelligence 29
- Cloud computing 27
- Computer programming 26
- Machine learning 26
- Management 26
- Computer security 21
- Data processing 21
- Java (Computer program language) 21
- Electrical & Computer Engineering 20
- Computer programs 19
- Examinations 18
- Software engineering 18
- Web site development 16
- Computer networks 15
- Blockchains (Databases) 14
- Certification 14
- Python (Computer program language) 14
- Art, Architecture & Applied Arts 13
- Design 13
- Photography 13
- Telecommunications 13
- Visual Arts 13
- Database management 12
- Electronic data processing personnel 12
- Information technology 12
-
381
-
382Publicado 2018Tabla de Contenidos: “…Working with the OpenSSL command line -- Introduction -- Mathematics -- Set -- Group -- Field -- A finite field -- Order -- An abelian group -- Prime fields -- Ring -- A cyclic group -- Modular arithmetic -- Cryptography -- Confidentiality -- Integrity -- Authentication -- Entity authentication -- Data origin authentication -- Non-repudiation -- Accountability -- Cryptographic primitives -- Symmetric cryptography -- Stream ciphers -- Block ciphers -- Block encryption mode -- Electronic Code Book -- Cipher Block Chaining -- Counter mode -- Keystream generation mode -- Message authentication mode -- Cryptographic hash mode -- Data Encryption Standard -- Advanced Encryption Standard -- How AES works -- Summary -- Chapter 4: Public Key Cryptography -- Asymmetric cryptography -- Integer factorization -- Discrete logarithm -- Elliptic curves -- Public and private keys -- RSA -- Encryption and decryption using RSA -- Elliptic Curve Cryptography -- Mathematics behind ECC -- Point addition -- Point doubling -- Discrete logarithm problem in ECC -- RSA using OpenSSL -- RSA public and private key pair -- Private key -- Public key -- Exploring the public key -- Encryption and decryption -- Encryption -- Decryption -- ECC using OpenSSL -- ECC private and public key pair -- Private key -- Private key generation -- Hash functions -- Compression of arbitrary messages into fixed-length digest -- Easy to compute -- Preimage resistance -- Second preimage resistance -- Collision resistance -- Message Digest -- Secure Hash Algorithms -- Design of Secure Hash Algorithms -- Design of SHA-256 -- Design of SHA-3 (Keccak) -- OpenSSL example of hash functions -- Message Authentication Codes -- MACs using block ciphers -- Hash-based MACs -- Merkle trees -- Patricia trees -- Distributed Hash Tables -- Digital signatures -- RSA digital signature algorithm -- Sign then encrypt…”
Libro electrónico -
383
-
384
-
385Publicado 2018Tabla de Contenidos: “…Business email compromise -- Letters -- Ubiquiti networks -- Legal concerns of pretexting -- Tools to enhance pretexts -- Tips -- Summary -- Chapter 8: Social Engineering Tools -- The tools for social engineering -- Physical tools -- Lockpicks -- Recording devices -- GPS trackers -- Software tools -- Maltego -- Features of the software -- Technical specifications -- How to use Maltego? …”
Libro electrónico -
386Publicado 2015“…This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. …”
Libro electrónico -
387Publicado 2017Tabla de Contenidos: “…The cryptocurrencies example -- A brief introduction to object-oriented programming -- The purpose of object-oriented programming -- Important concepts behind object-oriented languages -- Encapsulation -- Polymorphism -- Hierarchies -- Classes and constructors -- Public and private methods -- Interfaces, factories, and patterns in general -- Introducing three object models in R - S3, S4, and R6 -- The first source of confusion - various object models -- The second source of confusion - generic functions -- The S3 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- The S4 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- The R6 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- Active bindings -- Finalizers -- The architecture behind our cryptocurrencies system -- Starting simple with timestamps using S3 classes -- Implementing cryptocurrency assets using S4 classes -- Implementing our storage layer with R6 classes -- Communicating available behavior with a database interface -- Implementing a database-like storage system with CSV files -- Easily allowing new database integration with a factory -- Encapsulating multiple databases with a storage layer -- Retrieving live data for markets and wallets with R6 classes -- Creating a very simple requester to isolate API calls -- Developing our exchanges infrastructure -- Developing our wallets infrastructure -- Implementing our wallet requesters -- Finally introducing users with S3 classes -- Helping ourselves with a centralized settings file -- Saving our initial user data into the system -- Activating our system with two simple functions…”
Libro electrónico -
388Publicado 2015“…This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). …”
Libro electrónico -
389Publicado 2022Libro electrónico
-
390por Silvia, John
Publicado 2014Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
391
-
392Publicado 2021“…What You Will Learn: Know when to enlist cryptography, and how it is often misunderstood and misused Explore modern cryptography algorithms, practices, and properties Design and implement usable, advanced cryptographic methods and mechanisms Understand how new features in C# and .NET impact the future of cryptographic algorithms Use the cryptographic model, services, and System.Security.Cryptography namespace in .NET Modernize your cryptanalyst mindset by exploiting the performance of C# and .NET with its weak cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures Discover how most algorithms can be broken This book is for information security experts, cryptologists, software engineers, developers, data scientists, and academia who have experience with C#, .NET, as well as IDEs such as Visual Studio, VS Code, or Mono. …”
Libro electrónico -
393
-
394
-
395
-
396Publicado 2023Tabla de Contenidos: “…A special case - String -- Naming identifiers -- Constants -- Operators -- Casting -- Overflow and underflow -- Wrapper classes -- The math library -- Summary -- Further reading -- Chapter 5: Language Fundamentals - Classes -- Technical requirements -- Class fields -- Understanding access control -- Packages -- The public specifier -- The private specifier -- The protected specifier -- The package specifier -- Understanding classes -- constructor and finalize methods -- Revising the compound interest program -- Class organization based on functionality -- Summary -- Further reading -- Chapter 6: Methods, Interfaces, Records, and Their Relationships -- Technical requirements -- Understanding methods -- Access control designation -- Static or non-static designation and the this reference -- Override permission - final -- Override required - abstract -- Return type -- Method name -- Parameter variables -- Annotations -- Exception handling - throws -- Thread setting -- Generic parameters -- Understanding inheritance -- The superclass of all objects, the Object class -- Understanding the class interface -- Abstract class versus interface -- Sealed classes and interfaces -- Understanding the record class -- Understanding polymorphism -- Understanding composition in classes -- Association -- Aggregation -- Summary -- Chapter 7: Java Syntax and Exceptions -- Technical requirements -- Understanding coding structures -- Code blocks -- Statements -- Expressions -- Operators -- Iteration -- Decision-making -- Handling exceptions -- The stack trace -- Ending the program -- The throw and throws statements -- The finally block -- Creating your own exception classes -- Summary -- Further reading -- Chapter 8: Arrays, Collections, Generics, Functions, and Streams -- Technical requirements -- Understanding the array data structure…”
Libro electrónico -
397por National Forum on BioDiversityTabla de Contenidos: “…THE GLOBAL IMPORTANCE OF PLANT-DERIVED DRUGS -- THE IMPORTANCE OF HERBAL DRUGS -- In Hong Kong -- In Japan -- In the People's Republic of China -- THE SEARCH FOR NEW PLANT DRUGS -- Use of the NAPRALERT Data Base -- PHARMACOLOGICAL INTEREST IN NATURAL PRODUCTS -- APPROACHES TO DRUG DISCOVERY FROM PLANTS -- LACK OF INTEREST IN NEW DRUG DISCOVERY PROGRAMS FROM PLANTS -- SUMMARY -- References -- Chapter 10 Serendipity in the Exploration of Biodiversity What Good are Weedy Tomatoes? …”
Publicado 1988
Libro electrónico -
398Publicado 2020“…ICPE proceeded with the publication of these proceedings and with the availability of video presentations and slides linked to the conference program in the website. …”
Libro electrónico -
399
-
400