Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
5,203 result(s) for "Telecommunication - Security measures"
Sort by:
Communication System Security
Helping current and future system designers take a more productive approach in the field, this text shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. The book includes many examples, figures, exercises, and projects and provides PowerPoint slides and other ancillaries on the author's website. A solutions manual is available with qualifying course adoption.
Security without obscurity : a guide to cryptographic architectures
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use-- Provided by the publisher.
Convergence
The Center for Complex Operations (CCO) has produced this edited volume, Convergence: Illicit Networks and National Security in the Age of Globalization, that delves deeply into everything mentioned above and more. In a time when the threat is growing, this is a timely effort. CCO has gathered an impressive cadre of authors to illuminate the important aspects of transnational crime and other illicit networks. They describe the clear and present danger and the magnitude of the challenge of converging and connecting illicit networks; the ways and means used by transnational criminal networks and how illicit networks actually operate and interact; how the proliferation, convergence, and horizontal diversification of illicit networks challenge state sovereignty; and how different national and international organizations are fighting back. A deeper understanding of the problem will allow us to then develop a more comprehensive, more effective, and more enduring solution. Other related products: YouTube War: Fighting in a World of Cameras in Every Cell Phone and Photoshop on Every Computer can be found here: https://bookstore.gpo.gov/products/sku/008-000-01071-4 Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications can be found here: https://bookstore.gpo.gov/products/sku/008-000-01128-1 Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes can be found here: https://bookstore.gpo.gov/products/sku/008-000-01139-7 Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications can be found here: https://bookstore.gpo.gov/products/sku/008-000-01094-3 Legality in Cyberspace: An Adversary View can be found here: https://bookstore.gpo.gov/products/sku/008-000-01108-7 Cyberterrorism After Stuxnet can be found here: https://bookstore.gpo.gov/products/sku/008-000-01117-6 Fundamentals of War Gaming --Print Paperback format can be found here: https://bookstore.gpo.gov/products/sku/008-046-00299-1 -- Print Hardcover format can be found here: https://bookstore.gpo.gov/products/sku/008-046-00269-0 Policy Analysis in National Security Affairs: New Methods for a New Era can be found here: https://bookstore.gpo.gov/products/sku/008-020-01561-0 Economic Security: Neglected Dimension of National Security --print paperback format can be found here: https://bookstore.gpo.gov/products/sku/008-020-01617-9 --ePub format can be found here: https://bookstore.gpo.gov/products/sku/999-000-44440-9 Other products produced by the U.S. Army, National Defense University can be found here: https://bookstore.gpo.gov/agency/1078 Other products produced by the U.S. Army War College, Strategic Studies Institute can be found here: https://bookstore.gpo.gov/agency/1609.
A cryptography primer : secrets and promises
\"Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure\"-- Provided by publisher.
Secure Communicating Systems
More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented.
Chaotic Secure Communication
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.