Explore the latest books of this year!
Bookbot

Paul C. van Oorschot

    Computer Security and the Internet
    Handbook of Applied Cryptography
    • Handbook of Applied Cryptography

      Revised Reprint with Updates

      Cryptography, particularly public-key cryptography, has become a crucial discipline over the past two decades, underpinning information security across various applications. Emerging standards aim to address the need for cryptographic protection in data communications. Public-key techniques are widely utilized, especially in financial services, the public sector, and for personal privacy in electronic communication. This Handbook serves as an essential reference for both novices and experts seeking comprehensive coverage in cryptography. It is a timely guide for professionals engaged in the field. The Handbook provides a multifunctional approach: it introduces practical aspects of conventional and public-key cryptography, offers the latest techniques and algorithms for serious practitioners, and presents each major topic as a self-contained unit. Additionally, it includes mathematical treatments alongside practical discussions, balancing abstraction for theoreticians with detailed implementation guidance for practitioners. Now in its third printing, this definitive reference is invaluable for developers, designers, researchers, engineers, computer scientists, and mathematicians at all levels.

      Handbook of Applied Cryptography
    • Computer Security and the Internet

      Tools and Jewels from Malware to Bitcoin - Second Edition

      • 475 pages
      • 17 hours of reading

      This book offers a concise yet thorough overview of computer and Internet security, ideal for a one-term introductory course for undergraduates or first-year graduate students. It also serves as a self-study resource for software developers, computing professionals, technical managers, and government staff. The focus is on brevity while covering core topics and technical details within approximately 350 pages. Selected content is designated as optional to further prioritize learning. Academic concepts are reinforced with specifics and examples, linking them to real-world problems and incidents. The first chapter introduces a gentle overview and 20 design principles for security, while the subsequent ten chapters provide a framework for understanding security, regularly referencing these principles with supporting examples. These principles correspond to recurring security-related error patterns in software and system designs over the past 50 years. The book is accessible, assuming no prior background in security, yet it delves into low-level details for key topics to illustrate concepts effectively. It remains technically rigorous without mathematical proofs or lengthy code examples that can alienate general audiences. While knowledge of basic operating systems and networking is beneficial, review sections summarize essential background. Graduate students will find inline exercises and supplemental references useful for furthe

      Computer Security and the Internet