Amazon Price: N/A (as of April 27, 2017 05:58 –
A practical guide to learning penetration testing for Android devices and applications
About This Book
Explore the security vulnerabilities in Android applications and exploit them
Venture into the world of Android forensics and get control of devices using exploits
Hands-on approach covers security vulnerabilities in Android using methods such as Traffic Analysis, SQLite vulnerabilities, and Content Providers Leakage
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies on the three infeasible number-theoretic problems; no polynomial-time algorithms exist for these three problems. However, quantum polynomial-time algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.
Quantum Attacks on Public-Key Cryptosystems introduces the basic concepts and ideas of quantum computing and quantum computational complexity. The book discusses quantum algorithms for IFP, DLP and ECDLP, based on Shor’s seminal work. It also presents some possible alternative post-quantum cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.
This book is intended for graduate-level students and researchers in computing science, mathematics and digital communications as a second text or reference book. Cryptographers and professionals working in quantum computing, cryptography and network security will find this book a valuable asset.
Click here to buy from Amazon
Amazon Price: $23.00 $18.73 You save: $4.27 (19%). (as of April 26, 2017 23:27 –
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"nerds and visionaries turned freedom fightersteamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
Amazon Price: N/A (as of April 27, 2017 18:09 –
The issue of privacy on the Internet has long been a difficult one: there are a lot of good reasons that you might be leery of strangers reading your emails or spying on the websites you visit.
A number of powerful tools exist which allow you to protect your privacy online. One of the most useful of these tools is called Tor. Tor provides truly anonymous and untraceable browsing and messaging, as well as access to the so called "Deep Web", a network of anonymous, untraceable, unblockable websites, available only through Tor, which provide everything from resources for political activists to pirated movies. The military-grade encryption behind Tor is so powerful that it can't plausibly be broken by any organization on the planet.
Amazon Price: $42.00 $30.23 You save: $11.77 (28%). (as of April 27, 2017 13:49 –
Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them.
After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get started protecting your network right away.
Malware, Rootkits & Botnets: A Beginner's Guide features: Lingo–Common security terms defined so that you're in the know on the job IMHO–Frank and relevant opinions based on the author's years of industry experience Budget Note–Tips for getting security technologies and processes into your organization's budget In Actual Practice–Exceptions to the rules of security explained in real-world contexts Your Plan–Customizable checklists you can use on the job now Into Action–Tips on how, why, and when to apply new skills and techniques at work