We a good story
Quick delivery in the UK

Books in the Information Security and Cryptography series

Filter
Filter
Sort bySort Series order
  • by Peter Muller, Adrian Perrig, David Basin, et al.
    £66.99 - 97.49

  • - An Approach to Modern Cryptography
    by Arno Mittelbach & Marc Fischlin
    £49.99 - 83.49

  • - The Advanced Encryption Standard (AES)
    by Joan Daemen & Vincent Rijmen
    £142.49

    An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch.

  • by Yan Lin
    £99.49

    To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and heuristic-based mechanism to more accurately recover function signature.

  • - Tools and Jewels from Malware to Bitcoin
    by Paul C. van Oorschot
    £49.99

    This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students.

  • by Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk & et al.
    £50.99

    This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability.

  • by Nigel Smart
    £26.99 - 40.99

    He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The author balances a largely non-rigorous style - many proofs are sketched only - with appropriate formality and depth.

  • by Benny Applebaum
    £50.99

    This book establishes, for the first time, the potential application of NCO implementations to cryptographic primitives such as one-way functions, pseudorandom generators, encryption schemes and digital signatures. The author explores numerous key issues.

  • - Principles and Applications
    by Hans Delfs & Helmut Knebl
    £66.99

    Includes a section that covers key concepts of cryptography, from encryption and digital signatures to cryptographic protocols. This book demonstrates essential techniques in protocols for key exchange, user identification, electronic elections and digital cash.

  • by Rosario Giustolisi
    £50.99

    In this book the author introduces a novel approach to securing exam systems. He describes the tasks that occur during an exam, taking account of the levels of detail and abstraction of an exam specification and the threats that arise out of the different exam roles.

  • by Annabelle McIver, Geoffrey Smith, Carroll Morgan, et al.
    £61.49

    This book presents a comprehensive mathematical theory that explains precisely what information flow is, how it can be assessed quantitatively ¿ so bringing precise meaning to the intuition that certain information leaks are small enough to be tolerated ¿ and how systems can be constructed that achieve rigorous, quantitative information-flow guarantees in those terms. It addresses the fundamental challenge that functional and practical requirements frequently conflict with the goal of preserving confidentiality, making perfect security unattainable.Topics include: a systematic presentation of how unwanted information flow, i.e., "leaks", can be quantified in operationally significant ways and then bounded, both with respect to estimated benefit for an attacking adversary and by comparisons between alternative implementations; a detailed study of capacity, refinement, and Dalenius leakage, supporting robust leakage assessments; a unification of information-theoretic channels and information-leaking sequential programs within the same framework; and a collection of case studies, showing how the theory can be applied to interesting realistic scenarios.The text is unified, self-contained and comprehensive, accessible to students and researchers with some knowledge of discrete probability and undergraduate mathematics, and contains exercises to facilitate its use as a course textbook.

  • by Lars R. Knudsen & Matthew Robshaw
    £72.49

    Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key.

  • - AES - The Advanced Encryption Standard
    by Joan Daemen & Vincent Rijmen
    £88.49

    An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.