Mostrando 381 - 400 Resultados de 598 Para Buscar 'Software in the Public Interest', tiempo de consulta: 0.10s Limitar resultados
  1. 381
    por Adobe Creative Team
    Publicado 2005
    Libro electrónico
  2. 382
    Publicado 2018
    Tabla de Contenidos: “…Working with the OpenSSL command line -- Introduction -- Mathematics -- Set -- Group -- Field -- A finite field -- Order -- An abelian group -- Prime fields -- Ring -- A cyclic group -- Modular arithmetic -- Cryptography -- Confidentiality -- Integrity -- Authentication -- Entity authentication -- Data origin authentication -- Non-repudiation -- Accountability -- Cryptographic primitives -- Symmetric cryptography -- Stream ciphers -- Block ciphers -- Block encryption mode -- Electronic Code Book -- Cipher Block Chaining -- Counter mode -- Keystream generation mode -- Message authentication mode -- Cryptographic hash mode -- Data Encryption Standard -- Advanced Encryption Standard -- How AES works -- Summary -- Chapter 4: Public Key Cryptography -- Asymmetric cryptography -- Integer factorization -- Discrete logarithm -- Elliptic curves -- Public and private keys -- RSA -- Encryption and decryption using RSA -- Elliptic Curve Cryptography -- Mathematics behind ECC -- Point addition -- Point doubling -- Discrete logarithm problem in ECC -- RSA using OpenSSL -- RSA public and private key pair -- Private key -- Public key -- Exploring the public key -- Encryption and decryption -- Encryption -- Decryption -- ECC using OpenSSL -- ECC private and public key pair -- Private key -- Private key generation -- Hash functions -- Compression of arbitrary messages into fixed-length digest -- Easy to compute -- Preimage resistance -- Second preimage resistance -- Collision resistance -- Message Digest -- Secure Hash Algorithms -- Design of Secure Hash Algorithms -- Design of SHA-256 -- Design of SHA-3 (Keccak) -- OpenSSL example of hash functions -- Message Authentication Codes -- MACs using block ciphers -- Hash-based MACs -- Merkle trees -- Patricia trees -- Distributed Hash Tables -- Digital signatures -- RSA digital signature algorithm -- Sign then encrypt…”
    Libro electrónico
  3. 383
    por Adobe Creative Team
    Publicado 2006
    Libro electrónico
  4. 384
    Publicado 2005
    Libro electrónico
  5. 385
    Publicado 2018
    Tabla de Contenidos: “…Business email compromise -- Letters -- Ubiquiti networks -- Legal concerns of pretexting -- Tools to enhance pretexts -- Tips -- Summary -- Chapter 8: Social Engineering Tools -- The tools for social engineering -- Physical tools -- Lockpicks -- Recording devices -- GPS trackers -- Software tools -- Maltego -- Features of the software -- Technical specifications -- How to use Maltego? …”
    Libro electrónico
  6. 386
    Publicado 2015
    “…This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. …”
    Libro electrónico
  7. 387
    Publicado 2017
    Tabla de Contenidos: “…The cryptocurrencies example -- A brief introduction to object-oriented programming -- The purpose of object-oriented programming -- Important concepts behind object-oriented languages -- Encapsulation -- Polymorphism -- Hierarchies -- Classes and constructors -- Public and private methods -- Interfaces, factories, and patterns in general -- Introducing three object models in R - S3, S4, and R6 -- The first source of confusion - various object models -- The second source of confusion - generic functions -- The S3 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- The S4 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- The R6 object model -- Classes, constructors, and composition -- Public methods and polymorphism -- Encapsulation and mutability -- Inheritance -- Active bindings -- Finalizers -- The architecture behind our cryptocurrencies system -- Starting simple with timestamps using S3 classes -- Implementing cryptocurrency assets using S4 classes -- Implementing our storage layer with R6 classes -- Communicating available behavior with a database interface -- Implementing a database-like storage system with CSV files -- Easily allowing new database integration with a factory -- Encapsulating multiple databases with a storage layer -- Retrieving live data for markets and wallets with R6 classes -- Creating a very simple requester to isolate API calls -- Developing our exchanges infrastructure -- Developing our wallets infrastructure -- Implementing our wallet requesters -- Finally introducing users with S3 classes -- Helping ourselves with a centralized settings file -- Saving our initial user data into the system -- Activating our system with two simple functions…”
    Libro electrónico
  8. 388
    Publicado 2015
    “…This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM z Systems hardware and software (referred to in this book by the previous product name, IBM System z®). …”
    Libro electrónico
  9. 389
    Publicado 2022
    Libro electrónico
  10. 390
  11. 391
    Libro electrónico
  12. 392
    Publicado 2021
    “…What You Will Learn: Know when to enlist cryptography, and how it is often misunderstood and misused Explore modern cryptography algorithms, practices, and properties Design and implement usable, advanced cryptographic methods and mechanisms Understand how new features in C# and .NET impact the future of cryptographic algorithms Use the cryptographic model, services, and System.Security.Cryptography namespace in .NET Modernize your cryptanalyst mindset by exploiting the performance of C# and .NET with its weak cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures Discover how most algorithms can be broken This book is for information security experts, cryptologists, software engineers, developers, data scientists, and academia who have experience with C#, .NET, as well as IDEs such as Visual Studio, VS Code, or Mono. …”
    Libro electrónico
  13. 393
    Publicado 2006
    Libro electrónico
  14. 394
    Publicado 2024
    Video
  15. 395
    Publicado 2019
    Libro electrónico
  16. 396
    Publicado 2023
    Tabla de Contenidos: “…A special case - String -- Naming identifiers -- Constants -- Operators -- Casting -- Overflow and underflow -- Wrapper classes -- The math library -- Summary -- Further reading -- Chapter 5: Language Fundamentals - Classes -- Technical requirements -- Class fields -- Understanding access control -- Packages -- The public specifier -- The private specifier -- The protected specifier -- The package specifier -- Understanding classes -- constructor and finalize methods -- Revising the compound interest program -- Class organization based on functionality -- Summary -- Further reading -- Chapter 6: Methods, Interfaces, Records, and Their Relationships -- Technical requirements -- Understanding methods -- Access control designation -- Static or non-static designation and the this reference -- Override permission - final -- Override required - abstract -- Return type -- Method name -- Parameter variables -- Annotations -- Exception handling - throws -- Thread setting -- Generic parameters -- Understanding inheritance -- The superclass of all objects, the Object class -- Understanding the class interface -- Abstract class versus interface -- Sealed classes and interfaces -- Understanding the record class -- Understanding polymorphism -- Understanding composition in classes -- Association -- Aggregation -- Summary -- Chapter 7: Java Syntax and Exceptions -- Technical requirements -- Understanding coding structures -- Code blocks -- Statements -- Expressions -- Operators -- Iteration -- Decision-making -- Handling exceptions -- The stack trace -- Ending the program -- The throw and throws statements -- The finally block -- Creating your own exception classes -- Summary -- Further reading -- Chapter 8: Arrays, Collections, Generics, Functions, and Streams -- Technical requirements -- Understanding the array data structure…”
    Libro electrónico
  17. 397
    por National Forum on BioDiversity
    Publicado 1988
    Tabla de Contenidos: “…THE GLOBAL IMPORTANCE OF PLANT-DERIVED DRUGS -- THE IMPORTANCE OF HERBAL DRUGS -- In Hong Kong -- In Japan -- In the People's Republic of China -- THE SEARCH FOR NEW PLANT DRUGS -- Use of the NAPRALERT Data Base -- PHARMACOLOGICAL INTEREST IN NATURAL PRODUCTS -- APPROACHES TO DRUG DISCOVERY FROM PLANTS -- LACK OF INTEREST IN NEW DRUG DISCOVERY PROGRAMS FROM PLANTS -- SUMMARY -- References -- Chapter 10 Serendipity in the Exploration of Biodiversity What Good are Weedy Tomatoes? …”
    Libro electrónico
  18. 398
    Publicado 2020
    “…ICPE proceeded with the publication of these proceedings and with the availability of video presentations and slides linked to the conference program in the website. …”
    Libro electrónico
  19. 399
    Publicado 2019
    Libro electrónico
  20. 400
    Publicado 2024
    Grabación no musical