Sign up for offers & news
Enter your email address to receive news and special offers.
A back-to-basics guide on coding for absolute beginners - no prior experience required! How to Think Like a Coder introduces the key concepts of coding, such as loops, data types and calculations without having to learn a single line of code! Simple activities that draw analogies with the outside world...
By Keith Martin
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for various technologies.
Unsolved!: The History and Mystery of the World\'s Greatest Ciphers from Ancient Egypt to Online Secret Societies
"In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet. Taped to his abdomen was an enciphered message. In 1912, a book dealer named Wilfrid Voynich came into possession of an illuminated cipher manuscript once belonging...
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows...
Advances in Cryptology -- EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, Proceedings
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013.
This brief focuses on radio resource allocation in a heterogeneous wireless medium. In the proposed solutions, mobile terminals play an active role in the resource allocation operation, instead of their traditional role as passive service recipients in the networking environment.