Catalog Search Results
Description
In this course, you will learn about Amazon Web Services (AWS) offerings designed to facilitate the practice of encryption throughout your data's cloud lifecycle. You will also have the option to review encryption concepts and practice selecting AWS offerings to meet common encryption needs.--Publisher.
Author
Description
"The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the...
Description
After his latest mission goes disastrously wrong, veteran CIA black ops agent Emerson Kent is given one last chance to prove he still has what it takes to do his job. His new assignment: guarding Katherine, a code operator at a top-secret remote CIA Numbers Station where encrypted messages are sent and received. When an elite team of heavily armed assailants lays siege to the station, Emerson and Katherine suddenly find themselves in a life-or-death...
6) The expert
Author
Description
The U.S. government accuses a company of treason for selling an advanced computer chip to China. The company denies the charge, an expert testifies the chip is beyond anyone's ability to make and the government, which claims to possess the chip, refuses to show it. A spoof on science and the law.
Author
Description
An American computer hacker operating in Southeast Asia attempts to break a World War II cypher to find the location of a missing shipment of gold. The gold was stolen by the Japanese during the war. Bouncing between World War II and the World Wide Web, Cryptonomicon follows the exploits of Lawrence Waterhouse, a young mathematical genius assigned to a highly secretive outfit that has cracked the fabled Nazi enigma code.
Author
Description
How can messages be transmitted secretly? How can one guarantee that the message arrives safely in the right hands exactly as it was transmitted? Cryptology, the art and science of 'secret writing', provides ideal methods to solve these problems of data security. Technological advances have stimulated interest in the study of cyptology. Of course, computers can break cryptosystems more efficiently than humans can. Computers allow complex and sophisticated...
Author
Description
Telecommunication has never been perfectly secure, as the Cold War culture of wiretaps and international spying taught us. Yet many of us still take our privacy for granted, even as we become more reliant than ever on telephones, computer networks, and electronic transactions of all kinds. So many of our relationships now use telecommunication as the primary mode of communication that the security of these transactions has become a source of wide...
Author
Description
"New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation...
Author
Description
"Codes are a part of everyday life, from the ubiquitous Universal Price Code (UPC) to postal zip codes. They need not be intended for secrecy. They generally use groups of letters (sometimes pronounceable code words) or numbers to represent other words or phrases. There is typically no mathematical rule to pair an item with its representation in code. A few more examples will serve to illustrate the range of codes"--
Author
Description
Blockchain technology enables the creation of decentralized currencies, decentralized applications powered by smart contracts, self-executing digital agreements, and intelligent assets that can be controlled over the Internet. Blockchains also enable the development of new governance systems with more democratic or participatory decision-making, and decentralized (autonomous) organizations that can operate over a network of computers without any human...
In ILL
Didn't find what you need? Items not owned by San Antonio College Library can be requested from other ILL libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request