Coding theory and cryptology Books

221 products


  • Public Key Cryptosystems

    CRC Press Public Key Cryptosystems

    2 in stock

    Book SynopsisThis book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience. To provide the necessary background, Chapters 1 and 2 are devoted to the selected fundamental concepts in cryptography mathematics and selected fundamental concepts in cryptography.Chapter 3 is devoted to discrete logarithm problem (DLP), DLP-related public key cryptosystems, digital signature algorithms, and their cryptanalysis. In this chapter, the elliptic curve counterparts of the algorithms and the basic algorithms for the solution of DLP are also given. In Chapter 4, RSA public key cryptosystem, RSA digital signature algorithm, the basic cryptanalysis approaches, and the integer factorization methods are provided. Chapter 5 is devoted to GGH and NTRU public key cryptosystems, GGH and NTRU digital sig

    2 in stock

    £42.74

  • New Storytelling

    CRC Press New Storytelling

    1 in stock

    Book SynopsisThere is a global need to become less fearful of coding, as it improves communication with the coders on the job and helps with prompt writing, which hiring companies often request. This set of story-based learning projects links performances and tasks with computing codes to show how a machine translates our goals into its language. Metaphors link instructions telling a computer what task to perform with similar functions in other disciplines. The materials serve those in Computer Graphics, Digital Media, or anyone interested in understanding and becoming familiar with principles and the logic behind coding, and help understand machines when writing a prompt. Dance, music, and performing visually present knowledge through stories and serve as a metaphor for understanding how coding and current technologies affect various disciplines. By symbolizing basic ideas behind programming, this book shows how computing and nature overlap through storytelling.Most jobs are collaborative, and coding involves many parts of production processes. These knowledge-based stories improve communication between the artists and the coders to bridge the gap between them.It is a part of the âœKnowledge Through the Artsâ series, consisting of:Dance Code - Dance Steps as a CodeNew Storytelling - Learning Through MetaphorsCode Appreciation - Reshaping KnowledgeNature Appreciation - Knowledge as Art

    1 in stock

    £46.54

  • Gonzo Capitalism

    Pan Macmillan Gonzo Capitalism

    7 in stock

    Book SynopsisFrom Chris Guillebeau, the New York Times bestselling author of The $100 Startup, comes a captivating guide that explains how to create new income streams and thrive in today's turbulent economy. The nine-to-five is dead. This is Gonzo Capitalism.'A must-read guide to the new economy. This book will help you navigate emerging paths to prosperity that you didn’t even know existed!'Ozan Varol, bestselling author of Think Like a Rocket ScientistBurdened with piling student debt, stagnant wages, and a rising cost of living, a growing number of enterprising individuals are abandoning the traditional nine-to-five model of modern work. Instead, they’re turning to an ecosystem of unregulated, decentralized platforms to build their own version of success.In Gonzo Capitalism, serial entrepreneur and self-help expert Chris Guillebeau explores this brave new world – from the tech workers wTrade ReviewA must-read guide to the new economy. This book will help you navigate emerging paths to prosperity that you didn’t even know existed. If you weren’t a Guillebeau fan already, you will be after this! -- Ozan Varol, bestselling author of Think Like a Rocket ScientistA fascinating romp through the Wild West of modern capitalism. A field guide to not only understanding what's happening, but how you can directly harness and benefit from it -- Tiago Forte, bestselling author of Building a Second BrainStraightforward, and packs in lots of tips . . . An ideal guide -- Financial Times on Side HustleIf you're not ready to launch your own business after reading this book, you need to go back and read it again! -- Daniel H. Pink, bestselling author of Drive, on The $100 StartupSmart, honest, and dangerous. Why dangerous? Because it is as practical as it is inspiring -- Brene Brown, bestselling author of The Gifts of Imperfection, on The Happiness of PursuitGuillebeau is the Indiana Jones of career experts -- Gretchen Rubin, author of The Happiness Project

    7 in stock

    £17.00

  • CRC Press Nature Appreciation

    2 in stock

    Book SynopsisIf asked what all people can agree with, we can see one answer: we all love Nature, one way or another. Scientists believe we only know ten percent of all the species on our planet. Impossible creatures (one can perceive as atoms, molecules, or minerals) playfully deliver computer codes, with an underlying notion that everything is connected: in nature, materials, sciences, techniques, computing, and the arts. In this innovative space, these characters introduce programming. While coding is intertwined into simple facts, Nature Appreciation shows ways we appreciate nature, thus, helping us learn in a playful, nonjudgmental way.Knowledge is divided into subjects and classes at schools, colleges, then universities. Facts, processes, and rules cannot be separated. They are all connected: biochemistry, product materiality changes from matter to energy and vice versa, and conversion of one state into another. In this book, they are considered as different ways of living, such as geo, earth, soil, minerals, and natural resources experienced when walking on the ground. Waves, communication, transformation, music, light, color - everything is related to light, electromagnetic waves, oscillation and vibration, visually static worlds, space exploration, and deep underwater are included as well.It is a part of the âœKnowledge Through the Artsâ series, consisting of:Dance Code - Dance Steps as a CodeNew Storytelling - Learning Through MetaphorsCode Appreciation - Reshaping KnowledgeNature Appreciation - Knowledge as Art

    2 in stock

    £46.54

  • Blockchain Tethered AI

    O'Reilly Media Blockchain Tethered AI

    2 in stock

    Book SynopsisWith this practical book, system architects, software engineers, and systems solution specialists will learn how enterprise blockchain provides permanent provenance of AI, removes the mystery, and allows you to validate AI before it's ever used.

    2 in stock

    £47.99

  • A Comprehensive Course in Number Theory

    Cambridge University Press A Comprehensive Course in Number Theory

    15 in stock

    Book SynopsisDeveloped from the author's popular text, A Concise Introduction to the Theory of Numbers, this book provides a comprehensive initiation to all the major branches of number theory. Beginning with the rudiments of the subject, the author proceeds to more advanced topics, including elements of cryptography and primality testing, an account of number fields in the classical vein including properties of their units, ideals and ideal classes, aspects of analytic number theory including studies of the Riemann zeta-function, the prime-number theorem and primes in arithmetical progressions, a description of the HardyâLittlewood and sieve methods from respectively additive and multiplicative number theory and an exposition of the arithmetic of elliptic curves. The book includes many worked examples, exercises and further reading. Its wider coverage and versatility make this book suitable for courses extending from the elementary to beginning graduate studies.Trade Review'[Baker] … possesses … powerful gifts for precision and concision … [the book] never seems rushed or artificially compressed. Highly recommended.' D. V. Feldman, ChoiceTable of ContentsPreface; Introduction; 1. Divisibility; 2. Arithmetical functions; 3. Congruences; 4. Quadratic residues; 5. Quadratic forms; 6. Diophantine approximation; 7. Quadratic fields; 8. Diophantine equations; 9. Factorization and primality testing; 10. Number fields; 11. Ideals; 12. Units and ideal classes; 13. Analytic number theory; 14. On the zeros of the zeta-function; 15. On the distribution of the primes; 16. The sieve and circle methods; 17. Elliptic curves; Bibliography; Index.

    15 in stock

    £36.99

  • Competitive Programming in Python

    Cambridge University Press Competitive Programming in Python

    15 in stock

    Book SynopsisWant to kill it at your job interview in the tech industry? Want to win that coding competition? Learn all the algorithmic techniques and programming skills you need from two experienced coaches, problem setters, and jurors for coding competitions. The authors highlight the versatility of each algorithm by considering a variety of problems and show how to implement algorithms in simple and efficient code. Readers can expect to master 128 algorithms in Python and discover the right way to tackle a problem and quickly implement a solution of low complexity. Classic problems like Dijkstra''s shortest path algorithm and Knuth-Morris-Pratt''s string matching algorithm are featured alongside lesser known data structures like Fenwick trees and Knuth''s dancing links. The book provides a framework to tackle algorithmic problem solving, including: Definition, Complexity, Applications, Algorithm, Key Information, Implementation, Variants, In Practice, and Problems. Python code included in the boTrade Review'This book guides the reader through a collection of interesting problems, teaching us many ideas that underlie efficient algorithms. The simplicity of Python helps highlight the beauty and accessibility of the ideas. I found it a most enjoyable and engaging book.' Anupam Gupta, Carnegie Mellon UniversityTable of Contents1. Introduction; 2. Character strings; 3. Sequences; 4. Arrays; 5. Intervals; 6. Graphs; 7. Cycles in graphs; 8. Shortest paths; 9. Matching and flows; 10. Trees; 11. Sets; 12. Points and polygons; 13. Rectangles; 14. Numbers and matrices; 15. Exhaustive search; 16. Conclusion.

    15 in stock

    £33.99

  • How to Write Good Programs

    Cambridge University Press How to Write Good Programs

    1 in stock

    Book SynopsisLearning to program isn''t just learning the details of a programming language: to become a good programmer you have to become expert at debugging, testing, writing clear code and generally unsticking yourself when you get stuck, while to do well in a programming course you have to learn to score highly in coursework and exams. Featuring tips, stories and explanations of key terms, this book teaches these skills explicitly. Examples in Python, Java and Haskell are included, helping you to gain transferable programming skills whichever language you are learning. Intended for students in Higher or Further Education studying early programming courses, it will help you succeed in, and get the most out of, your course, and support you in developing the software engineering habits that lead to good programs.Trade Review'Perdita Stevens' book How to Write Good Programs provides a wealth of excellent advice tailored to beginning students of programming. It is language-agnostic, well structured, and delivered in an accessible manner. It might as well have the words 'Don't Panic' in large, friendly letters on the cover.' Jeremy Gibbons, University of Oxford'This is the book I wish had existed during my time at university and at the beginning of my career! It explains fundamental concepts independently of a concrete programming language and contains many practical observations and tips to overcome situations where novice programmers tend to get stuck.' Jennifer Tenzer, Senior Developer'This is a unique book that feels like a conversation over a coffee with an experienced expert in computer programing. It is full of practical tips, insights, and folklore that will be of great benefit to anyone who wants to learn how to program well.' Professor Tom Ward, University of Leeds'Stevens's book differs from other coding books in that it assumes minimal knowledge in its readers. She discusses the concept of 'program', clarifying which problem you want to solve and choosing a development environment, all before she gets to her concrete coding tips. Especially the chapter on how to fix mistakes is a boon to the novice programmer. Few things are as frustrating as accidentally throwing away working code or - worse - not being able to get your program back to working order. And for those who have finally mastered programming fairly well, but have difficulty with their schoolwork, Stevens concludes with two chapters on how to score well on homework assignments and exams.' Karl van Heijster, De Leesclub van AllesTable of Contents1. Introduction; 2. What Are Good Programs?; 3. How to Get Started; 4. How to Understand Your Language; 5. How to Use the Best Tools; 6. How to Make Sure You Don't Lose Your Program; 7. How to Test Your Program; 8. How to Make Your Program Clear; 9. How to Debug Your Program; 10. How to Improve Your Program; 11. How to Get Help (without Cheating); 12. How to Score Well in Coursework; 13. How to Score Well in a Programming Exam; 14. How to Choose a Programming Language; 15. How to Go Beyond This Book; References; Index.

    1 in stock

    £15.99

  • An Introduction to Symbolic Dynamics and Coding

    Cambridge University Press An Introduction to Symbolic Dynamics and Coding

    15 in stock

    Book SynopsisSymbolic dynamics is a mature yet rapidly developing area of dynamical systems. It has established strong connections with many areas, including linear algebra, graph theory, probability, group theory, and the theory of computation, as well as data storage, statistical mechanics, and $C^*$-algebras. This Second Edition maintains the introductory character of the original 1995 edition as a general textbook on symbolic dynamics and its applications to coding. It is written at an elementary level and aimed at students, well-established researchers, and experts in mathematics, electrical engineering, and computer science. Topics are carefully developed and motivated with many illustrative examples. There are more than 500 exercises to test the reader''s understanding. In addition to a chapter in the First Edition on advanced topics and a comprehensive bibliography, the Second Edition includes a detailed Addendum, with companion bibliography, describing major developments and new research dTable of Contents1. Shift spaces; 2. Shifts of finite type; 3. Sofic shifts; 4. Entropy; 5. Finite-state codes; 6. Shifts as dynamical systems; 7. Conjugacy; 8. Finite-to-one codes and finite equivalence; 9. Degrees of codes and almost conjugacy; 10. Embeddings and factor codes; 11. Realization; 12. Equal entropy factors; 13. Guide to advanced topics; Addendum for the second edition; Bibliography; Addendum bibliography; Notation index; Index.

    15 in stock

    £51.99

  • Investigating Cryptocurrencies

    John Wiley & Sons Inc Investigating Cryptocurrencies

    1 in stock

    Book SynopsisTable of ContentsForeword xxi Introduction xxiii Part I Understanding the Technology 1 Chapter 1 What Is a Cryptocurrency? 3 A New Concept? 3 Leading Currencies in the Field 8 Is Blockchain Technology Just for Cryptocurrencies? 9 Setting Yourself Up as a Bitcoin User 10 Summary 14 Chapter 2 The Hard Bit 15 Hashing 16 Public/Private Key Encryption 21 RSA Cryptography 23 Elliptic Curve Cryptography 28 Building a Simple Cryptocurrency in the Lab 32 Summary 36 Chapter 3 Understanding the Blockchain 39 The Structure of a Block 40 The Block Header 42 Deconstructing Raw Blocks from Hex 47 Applying This to the Downloaded Hex 51 Number of Transactions 55 Block Height 57 Forks 58 The Ethereum Block 61 Summary 65 Chapter 4 Transactions 67 The Concept behind a Transaction 67 The Mechanics of a Transaction 69 Understanding the Mempool 76 Understanding the ScriptSig and ScriptPubKey 77 Interpreting Raw Transactions 79 Extracting JSON Data 81 Analyzing Address History 82 Creating Vanity Addresses 83 Interpreting Ethereum Transactions 85 Summary 86 Chapter 5 Mining 87 The Proof-of-Work Concept 89 The Proof-of-Stake Concept 90 Mining Pools 90 Mining Fraud 92 Summary 93 Chapter 6 Wallets 95 Wallet Types 96 Software Wallets 96 Hardware Wallets 97 Cold Wallets or Cold Storage 98 Why Is Recognizing Wallets Important? 99 Software Wallets 100 Hardware Wallets 100 Paper Wallets 100 The Wallet Import Format (WIF) 101 How Wallets Store Keys 102 Setting Up a Covert Wallet 105 Summary 107 Chapter 7 Contracts and Tokens 109 Contracts 109 Bitcoin 110 Ethereum 110 Tokens and Initial Coin Offerings 112 Summary 116 Part II Carrying Out Investigations 117 Chapter 8 Detecting the Use of Cryptocurrencies 119 The Premises Search 120 A New Category of Search Targets 121 Questioning 124 Searching Online 125 Extracting Private and Public Keys from Seized Computers 130 Commercial Tools 130 Extracting the Wallet File 131 Automating the Search for Bitcoin Addresses 135 Finding Data in a Memory Dump 136 Working on a Live Computer 137 Acquiring the Wallet File 138 Exporting Data from the Bitcoin Daemon 140 Extracting Wallet Data from Live Linux and OSX Systems 144 Summary 145 Chapter 9 Analysis of Recovered Addresses and Wallets 147 Finding Information on a Recovered Address 147 Extracting Raw Data from Ethereum 154 Searching for Information on a Specifi c Address 155 Analyzing a Recovered Wallet 161 Setting Up Your Investigation Environment 161 Importing a Private Key 166 Dealing with an Encrypted Wallet 167 Inferring Other Data 172 Summary 173 Chapter 10 Following the Money 175 Initial Hints and Tips 175 Transactions on Blockchain.info 176 Identifying Change Addresses 177 Another Simple Method to Identify Clusters 181 Moving from Transaction to Transaction 182 Putting the Techniques Together 184 Other Explorer Sites 186 Following Ethereum Transactions 189 Monitoring Addresses 193 Blockonomics.co 193 Bitnotify.com 194 Writing Your Own Monitoring Script 194 Monitoring Ethereum Addresses 196 Summary 197 Chapter 11 Visualization Systems 199 Online Blockchain Viewers 199 Blockchain.info 200 Etherscan.io 201 Commercial Visualization Systems 214 Summary 215 Chapter 12 Finding Your Suspect 217 Tracing an IP Address 217 Bitnodes 219 Other Areas Where IPs Are Stored 226 Is the Suspect Using Tor? 228 Is the Suspect Using a Proxy or a VPN? 229 Tracking to a Service Provider 231 Considering Open-Source Methods 235 Accessing and Searching the Dark Web 237 Detecting and Reading Micromessages 241 Summary 244 Chapter 13 Sniffi ng Cryptocurrency Traffi c 245 What Is Intercept? 246 Watching a Bitcoin Node 247 Sniffi ng Data on the Wire 248 Summary 254 Chapter 14 Seizing Coins 255 Asset Seizure 256 Cashing Out 256 Setting Up a Storage Wallet 259 Importing a Suspect’s Private Key 261 Storage and Security 263 Seizure from an Online Wallet 265 Practice, Practice, Practice 265 Summary 266 Chapter 15 Putting It All Together 267 Examples of Cryptocurrency Crimes 268 Buying Illegal Goods 268 Selling Illegal Goods 268 Stealing Cryptocurrency 269 Money Laundering 269 Kidnap and Extortion 270 What Have You Learned? 270 Where Do You Go from Here? 273 Index 275

    1 in stock

    £40.00

  • Hacking Connected Cars

    John Wiley & Sons Inc Hacking Connected Cars

    15 in stock

    Book SynopsisA field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars. Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion Table of ContentsAbout the Author v Acknowledgments vii Foreword xv Introduction xix Part I Tactics, Techniques, and Procedures 1 Chapter 1 Pre-Engagement 3 Penetration Testing Execution Standard 4 Scope Definition 6 Architecture 7 Full Disclosure 7 Release Cycles 7 IP Addresses 7 Source Code 8 Wireless Networks 8 Start and End Dates 8 Hardware Unique Serial Numbers 8 Rules of Engagement 9 Timeline 10 Testing Location 10 Work Breakdown Structure 10 Documentation Collection and Review 11 Example Documents 11 Project Management 13 Conception and Initiation 15 Definition and Planning 16 Launch or Execution 22 Performance/Monitoring 23 Project Close 24 Lab Setup 24 Required Hardware and Software 25 Laptop Setup 28 Rogue BTS Option 1: OsmocomBB 28 Rogue BTS Option 2: BladeRF + YateBTS 32 Setting Up Your WiFi Pineapple Tetra 35 Summary 36 Chapter 2 Intelligence Gathering 39 Asset Register 40 Reconnaissance 41 Passive Reconnaissance 42 Active Reconnaissance 56 Summary 59 Chapter 3 Threat Modeling 61 STRIDE Model 63 Threat Modeling Using STRIDE 65 Vast 74 Pasta 76 Stage 1: Define the Business and Security Objectives 77 Stage 2: Define the Technical Scope 78 Stage 3: Decompose the Application 79 Stage 4: Identify Threat Agents 80 Stage 5: Identify the Vulnerabilities 82 Stage 6: Enumerate the Exploits 82 Stage 7: Perform Risk and Impact Analysis 83 Summary 85 Chapter 4 Vulnerability Analysis 87 Passive and Active Analysis 88 WiFi 91 Bluetooth 100 Summary 105 Chapter 5 Exploitation 107 Creating Your Rogue BTS 108 Configuring NetworkinaPC 109 Bringing Your Rogue BTS Online 112 Hunting for the TCU 113 When You Know the MSISDN of the TCU 113 When You Know the IMSI of the TCU 114 When You Don’t Know the IMSI or MSISDN of the TCU 114 Cryptanalysis 117 Encryption Keys 118 Impersonation Attacks 123 Summary 132 Chapter 6 Post Exploitation 133 Persistent Access 133 Creating a Reverse Shell 134 Linux Systems 136 Placing the Backdoor on the System 137 Network Sniffing 137 Infrastructure Analysis 138 Examining the Network Interfaces 139 Examining the ARP Cache 139 Examining DNS 141 Examining the Routing Table 142 Identifying Services 143 Fuzzing 143 Filesystem Analysis 148 Command-Line History 148 Core Dump Files 148 Debug Log Files 149 Credentials and Certificates 149 Over-the-Air Updates 149 Summary 150 Part II Risk Management 153 Chapter 7 Risk Management 155 Frameworks 156 Establishing the Risk Management Program 158 SAE J3061 159 ISO/SAE AWI 21434 163 HEAVENS 164 Threat Modeling 166 STRIDE 168 PASTA 171 TRIKE 175 Summary 176 Chapter 8 Risk-Assessment Frameworks 179 HEAVENS 180 Determining the Threat Level 180 Determining the Impact Level 183 Determining the Security Level 186 EVITA 187 Calculating Attack Potential 189 Summary 192 Chapter 9 PKI in Automotive 193 VANET 194 On-board Units 196 Roadside Unit 196 PKI in a VANET 196 Applications in a VANET 196 VANET Attack Vectors 197 802.11p Rising 197 Frequencies and Channels 197 Cryptography 198 Public Key Infrastructure 199 V2X PKI200 IEEE US Standard 201 Certificate Security 201 Hardware Security Modules 201 Trusted Platform Modules 202 Certificate Pinning 202 PKI Implementation Failures 203 Summary 203 Chapter 10 Reporting 205 Penetration Test Report 206 Summary Page 206 Executive Summary 207 Scope 208 Methodology 209 Limitations 211 Narrative 211 Tools Used 213 Risk Rating 214 Findings 215 Remediation 217 Report Outline 217 Risk Assessment Report 218 Introduction 219 References 220 Functional Description 220 Head Unit 220 System Interface 221 Threat Model 222 Threat Analysis 223 Impact Assessment 224 Risk Assessment 224 Security Control Assessment 226 Example Risk Assessment Table 229 Summary 230 Index 233

    15 in stock

    £30.00

  • Cryptography Apocalypse

    John Wiley & Sons Inc Cryptography Apocalypse

    1 in stock

    Book SynopsisWill your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized crackers' to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today's computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every dayHTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most tTable of ContentsIntroduction xxi I Quantum Computing Primer 1 1 Introduction to Quantum Mechanics 3 What is Quantum Mechanics? 3 Quantum is Counterintuitive 4 Quantum Mechanics is Real 5 The Basic Properties of Quantum Mechanics 8 Photons and Quantum Mechanics 8 Photoelectric Effect 9 Wave-Particle Duality 10 Probability Principle 14 Uncertainty Principle 17 Spin States and Charges 20 Quantum Tunneling 20 Superposition 21 Observer Effect 22 No-Cloning Theorem 24 Spooky Entanglement 24 Decoherence 25 Quantum Examples in Our World Today 27 For Additional Information 28 Summary 29 2 Introduction to Quantum Computers 31 How are Quantum Computers Different? 31 Traditional Computers Use Bits 31 Quantum Computers Use Qubits 33 Quantum Computers are Not Ready for Prime Time Yet 37 Quantum Will Reign Supreme Soon 38 Quantum Computers Improve Qubits Using Error Correction 39 Types of Quantum Computers 44 Superconducting Quantum Computers 44 Quantum Annealing Computers 45 Universal Quantum Computers 47 Topological Quantum Computers 49 Microsoft Majorana Fermion Computers 50 Ion Trap Quantum Computers 51 Quantum Computers in the Cloud 53 Non-U.S. Quantum Computers 53 Components of a Quantum Computer 54 Quantum Software 55 Quantum Stack 55 Quantum National Guidance 56 National Policy Guidance 56 Money Grants and Investments 56 Other Quantum Information Science Besides Computers 57 For More Information 58 Summary 58 3 How Can Quantum Computing Break Today’s Cryptography? 59 Cryptography Basics 59 Encryption 59 Integrity Hashing 72 Cryptographic Uses 73 How Quantum Computers Can Break Cryptography 74 Cutting Time 74 Quantum Algorithms 76 What Quantum Can and Can’t Break 79 Still Theoretical 82 Summary 83 4 When Will the Quantum Crypto Break Happen? 85 It Was Always “10 Years from Now” 85 Quantum Crypto Break Factors 86 Is Quantum Mechanics Real? 86 Are Quantum Computers Real? 87 Is Superposition Real? 87 Is Peter Shor’s Algorithm Real? 88 Do We Have Enough Stable Qubits? 88 Quantum Resources and Competition 89 Do We Have Steady Improvement? 89 Expert Opinions 90 When the Quantum Cyber Break Will Happen 90 Timing Scenarios 90 When Should You Prepare? 93 Breakout Scenarios 95 Stays in the Realm of Nation-States for a Long Time 95 Used by Biggest Companies 97 Mass Proliferation 97 Most Likely Breakout Scenario 97 Summary 98 5 What Will a Post-Quantum World Look Like? 99 Broken Applications 99 Weakened Hashes and Symmetric Ciphers 100 Broken Asymmetric Ciphers 103 Weakened and Broken Random Number Generators 103 Weakened or Broken Dependent Applications 104 Quantum Computing 114 Quantum Computers 114 Quantum Processors 115 Quantum Clouds 115 Quantum Cryptography Will Be Used 116 Quantum Perfect Privacy 116 Quantum Networking Arrives 117 Quantum Applications 117 Better Chemicals and Medicines 118 Better Batteries 118 True Artificial Intelligence 119 Supply Chain Management 120 Quantum Finance 120 Improved Risk Management 120 Quantum Marketing 120 Better Weather Prediction 121 Quantum Money 121 Quantum Simulation 122 More Precise Military and Weapons 122 Quantum Teleportation 122 Summary 126 II Preparing for the Quantum Break 127 6 Quantum-Resistant Cryptography 129 NIST Post-Quantum Contest 129 NIST Security Strength Classifications 132 PKE vs. KEM 133 Formal Indistinguishability Assurances 134 Key and Ciphertext Sizes 135 Types of Post-Quantum Algorithms 136 Code-Based Cryptography 136 Hash-Based Cryptography 137 Lattice-Based Cryptography 138 Multivariate Cryptography 140 Supersingular Elliptic Curve Isogeny Cryptography 140 Zero-Knowledge Proof 141 Symmetric Key Quantum Resistance 142 Quantum-Resistant Asymmetric Encryption Ciphers 143 BIKE 145 Classic McEliece 145 CRYSTALS-Kyber 146 FrodoKEM 146 HQC 147 LAC 148 LEDAcrypt 148 NewHope 149 NTRU 149 NTRU Prime 150 NTS-KEM 150 ROLLO 151 Round5 151 RQC 151 SABER 152 SIKE 152 ThreeBears 153 General Observations on PKE and KEM Key and Ciphertext Sizes 155 Quantum-Resistant Digital Signatures 156 CRYSTALS-Dilithium 156 FALCON 157 GeMSS 158 LUOV 158 MQDSS 159 Picnic 159 qTESLA 160 Rainbow 160 SPHINCS+ 161 General Observations on Signature Key and Sizes 162 Caution Advised 164 A Lack of Standards 164 Performance Concerns 165 Lack of Verified Protection 165 For Additional Information 166 Summary 166 7 Quantum Cryptography 167 Quantum RNGs 168 Random is Not Always Random 168 Why is True Randomness So Important? 170 Quantum-Based RNGs 172 Quantum Hashes and Signatures 177 Quantum Hashes 177 Quantum Digital Signatures 178 Quantum Encryption Ciphers 180 Quantum Key Distribution 181 Summary 188 8 Quantum Networking 189 Quantum Network Components 189 Transmission Media 189 Distance vs. Speed 191 Point-to-Point 192 Trusted Repeaters 193 True Quantum Repeaters 194 Quantum Network Protocols 196 Quantum Network Applications 199 More Secure Networks 199 Quantum Computing Cloud 200 Better Time Syncing 200 Prevent Jamming 201 Quantum Internet 202 Other Quantum Networks 203 For More Information 204 Summary 204 9 Preparing Now 207 Four Major Post-Quantum Mitigation Phases 207 Stage 1: Strengthen Current Solutions 207 Stage 2: Move to Quantum-Resistant Solutions 211 Stage 3: Implement Quantum-Hybrid Solutions 213 Stage 4: Implement Fully Quantum Solutions 214 The Six Major Post-Quantum Mitigation Project Steps 214 Step 1: Educate 215 Step 2: Create a Plan 220 Step 3: Collect Data 225 Step 4: Analyze 226 Step 5: Take Action/Remediate 228 Step 6: Review and Improve 230 Summary 230 Appendix: Additional Quantum Resources 231 Index 239

    1 in stock

    £22.94

  • Tribe of Hackers Red Team

    John Wiley & Sons Inc Tribe of Hackers Red Team

    2 in stock

    Book SynopsisTable of ContentsIntroduction vi 01 Marcus J. Carey 1 02 David Bell 5 03 Paul Brager 10 04 Beau Bullock 16 05 Christopher Campbell 22 06 Stephanie Carruthers 28 07 Mark Clayton 34 08 Ben Donnelly 39 09 Skip Duckwall 47 10 Ronald Eddings 52 11 Justin Elze 57 12 Mike Felch 62 13 Kevin Figueroa 70 14 Marco Figueroa 75 15 Jared Folkins 80 16 Rob Fuller 86 17 Patrick Fussell 92 18 Chris Gates 97 19 Brian Genz 102 20 Jared Haight 112 21 Stephen Hilt 118 22 Brent Kennedy 122 23 David Kennedy 128 24 Maggie Ligon 139 25 Jeff rey Man 143 26 Tim MalcomVetter 151 27 Brandon McCrillis 161 28 Oddvar Moe 164 29 Chris Nickerson 169 30 Ryan O’Horo 176 31 Carlos Perez 179 32 Francesc Rodriguez 185 33 Derek Rook 190 34 Isaiah Sarju 195 35 Mary Sawyer 200 36 Bradley Schaufenbuel 204 37 Tinker Secor 210 38 Jayson E. Street 217 39 Chris Truncer 223 40 Carl Vincent 230 41 Georgia Weidman 238 42 Adam Willard 244 43 Jake Williams 248 44 Robert Willis 253 45 Robin Wood 259 46 Wirefall 264 47 Phillip Wylie 271 Epilogue 274

    2 in stock

    £17.09

  • Tribe of Hackers Blue Team

    John Wiley & Sons Inc Tribe of Hackers Blue Team

    1 in stock

    Book SynopsisBlue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skiTable of ContentsAcknowledgments vii Foreword ix Introduction xi 01 Marcus J. Carey 1 02 Danny Akacki 6 03 Ricky Banda 9 04 William Bengtson 14 05 Amanda Berlin 20 06 O’Shea Bowens 27 07 John Breth 31 08 Lee Brotherston 38 09 Ronald Bushar 47 10 Christopher Caruso 56 11 Eddie Clark 66 12 Mark Clayton 74 13 Ayman Elsawah 80 14 Sahan Fernando 91 15 Stephen Hilt 96 16 Bea Hughes 101 17 Terence Jackson 109 18 Tanya Janca 113 19 Ruth Juma 119 20 Brendon Kelley 123 21 Shawn Kirkland 129 22 Sami Laiho 139 23 Kat Maddox 143 24 Jeffrey Man 147 25 April Mardock 154 26 Bright Gameli Mawudor 159 27 Duncan McAlynn 164 28 Frank McGovern 170 29 Donald McFarlane 172 30 Nathan McNulty 180 31 James Medlock 187 32 Daniel Miessler 192 33 Alyssa Miller 196 34 Maggie Morganti 205 35 Justin Moss 211 36 Mark Orlando 218 37 Mitch Parker 224 38 Stuart Peck 231 39 Carlos Perez 236 40 Quiessence Phillips 242 41 Lauren Proehl 248 42 Josh Rickard 255 43 Megan Roddie 266 44 Jason Schorr 270 45 Chris Sistrunk 274 46 Jayson E. Street 280 47 Michael Tanji 286 48 Ronnie Tokazowski 294 49 Ashley Tolbert 298 50 Ismael Valenzuela 304 51 Dave Venable 321 52 Robert "TProphet" Walker 326 53 Jake Williams 334 54 Robert Willis 340

    1 in stock

    £17.09

  • Tribe of Hackers Security Leaders

    John Wiley & Sons Inc Tribe of Hackers Security Leaders

    1 in stock

    Book SynopsisTribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the Table of ContentsAcknowledgments vii Introduction viii 01 Marcus J. Carey 1 02 Ian Anderson 6 03 James Arlen 14 04 Mark Arnold 25 05 Andrew Bagrin 31 06 Zate Berg 36 07 Tash Bettridge 46 08 Philip Beyer 50 09 Kyle Bubp 58 10 Joanna Burkey 64 11 Bill Burns 70 12 Lesley Carhart 78 13 Christopher Caruso 83 14 Mike Chapple 91 15 Steve Christey Coley 98 16 Jim Christy 102 17 Chris Cochran 110 18 Edward Contreras 114 19 Dan Cornell 117 20 Mary Ann Davidson 124 21 Kimber Dowsett 132 22 David Evenden 136 23 Martin Fisher 141 24 Chris Hadnagy 147 25 Andrew Hay 153 26 Mark Hillick 157 27 Terence Jackson 165 28 Tanya Janca 168 29 David Kennedy 174 30 Joe Krull 180 31 Robert M. Lee 188 32 Rafal Los 194 33 Tracy Z. Maleeff 199 34 Jeffrey Man 202 35 Angela Marafino 209 36 James Medlock 212 37 Kent Nabors 221 38 Charles Nwatu 228 39 Greg Ose 232 40 Edward Prevost 239 41 Ray [REDACTED] 244 42 Stephen A. Ridley 249 43 David Rook 255 44 Marina Segal 259 45 Khalil Sehnaoui 262 46 Jackie Singh 267 47 Dan Tentler 271 48 Eugene Teo 274 49 Dominique West 279 50 Jake Williams 283 51 Wirefall 288 Appendix: Recommended Reading 293

    1 in stock

    £17.09

  • Cryptology

    CRC Press Cryptology

    Out of stock

    Book SynopsisCryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, VigenÃre, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a Table of Contents1. Introduction to CryptologyBasic TerminologyCryptology in PractiveWhy Study Cryptology?2. Substitution CiphersKeyword Substitution CiphersCryptanalysis of Substitution CipherPlayrair CiphersThe Navajo Code3. Transposition CiphersColumnar Transposition CiphersCryptanalysis of Transposition CiphersADFGX and ADFGVX Ciphers4. The Enigma MachineThe Enigma Cipher MachineCombinatoricsSecurity of the Enigma Machine5. The Turing BombeCribs and MenusLoops and Logical InconsistenciesSearching for the Correct ConfigurationThe Diagonal BoardThe Checking MachineTurnoversClonkingFinal Observations6. Shift and Affine CiphersModular ArithmeticShift CiphersCryptanalysis of Shift CiphersAffine CiphersCryptanalysis of Affine Ciphers7. Alberti and Vigenere CiphersAlberti CiphersVigenere CiphersProbabilityThe Friedman TestThe Kasiski TestCryptanalyis of Vigenere Keyword Ciphers8. Hill CiphersMatricesHill CiphersCryptanalyis of Hill Ciphers9. RSA CiphersIntroduction to Public-Key CiphersIntroduction to RSA CiphersThe Euclidean AlgorithmModular ExponentiationASCIIRSA CiphersCryptanalyis of RSA CiphersPrimality TestingInteger FactorizationThe RSA Factoring Challenges10. ElGamal CiphersThe Diffie-Hellman Key ExchangeDiscrete LogarithmsElGamal CiphersCryptanalyis of ElGamal Ciphers11. The Advanced Encryption StandardRepresentations of NumbersSream CiphersAES PreliminariesAES EncryptionAES DecryptionAES Security12. Message AuthenticationRSA SignaturesHash FunctionsRSA Signatures with HashingThe Man-in-the-Middle AttackPublic-Key InfrastructuresBibliographyHints and Answers for Selected ExercisesIndex

    Out of stock

    £104.50

  • The Truth Machine

    Picador USA The Truth Machine

    Out of stock

    Book SynopsisViews differ on bitcoin, but few doubt the transformative potential of Blockchain technology. The Truth Machine is the best book so far on what has happened and what may come along. It demands the attention of anyone concerned with our economic future. Lawrence H. Summers, Charles W. Eliot University Professor and President Emeritus at Harvard, Former Treasury SecretaryFrom Michael J. Casey and Paul Vigna, the authors of The Age of Cryptocurrency, comes the definitive work on the Internet's Next Big Thing: The Blockchain.Big banks have grown bigger and more entrenched. Privacy exists only until the next hack. Credit card fraud is a fact of life. Many of the legacy systems once designed to make our lives easier and our economy more efficient are no longer up to the task. Yet there is a way past all thisa new kind of operating system with the potential to revolutionize vast swaths of our economy: the blockchain. In The Tru

    Out of stock

    £15.30

  • Fundamentals of Classical and Modern

    Cambridge University Press Fundamentals of Classical and Modern

    1 in stock

    Book SynopsisUsing easy-to-follow mathematics, this textbook provides comprehensive coverage of block codes and techniques for reliable communications and data storage. It covers major code designs and constructions from geometric, algebraic, and graph-theoretic points of view, decoding algorithms, error control additive white Gaussian noise (AWGN) and erasure, and dataless recovery. It simplifies a highly mathematical subject to a level that can be understood and applied with a minimum background in mathematics, provides step-by-step explanation of all covered topics, both fundamental and advanced, and includes plenty of practical illustrative examples to assist understanding. Numerous homework problems are included to strengthen student comprehension of new and abstract concepts, and a solutions manual is available online for instructors. Modern developments, including polar codes, are also covered. An essential textbook for senior undergraduates and graduates taking introductory coding courses, Trade Review'… masterfully provides a comprehensive treatment of both traditional codes as well as new and most promising coding families and decoding algorithms …' Bane Vasić, University of Arizona' an excellent, unique, and valuable contribution to the teaching of the subject.' Ian Blake, University of British Columbia'A highly readable introduction into the theory of block codes, including classical code constructions, an extensive treatment of LDPC codes, with emphasis on quasi-cyclic constructions, and an introduction to polar codes. Recommended for a beginning graduate course in coding, with enough material for either one or two semesters. Numerous examples and problems make the book very student friendly.' Daniel Costello, University of Notre Dame'The book truly explains these highly mathematical subjects to a level that can be accessed and applied with as little background in mathematics as possible. It provides step-by-step explanation of all covered topics, both more theoretical or applied, and includes sufficient illustrative examples to assist understanding.' Nikolay Yankov, zbMATHTable of ContentsPreface; Acknowledgments; 1. Coding for reliable digital information transmission and storage; 2. Some elements of modern algebra and graphs; 3. Linear block codes; 4.Binary cyclic codes; 5. BCH codes; 6. Nonbinary BCH codes and Reed-Solomon codes; 7. Finite geometries, cyclic finite geometry codes, and majority-logic decoding; 8. Reed-Muller codes; 9. Some coding techniques; 10. Correction of error-bursts and erasures; 11. Introduction to low-density parity-check codes; 12. Cyclic and quasi-cyclic LDPC codes on finite geometries; 13. Partial geometries and their associated QC-LDPC codes; 14. Quasi-cyclic LDPC codes based on finite fields; 15. Graph-theoretic LDPC codes; 16. Collective encoding and soft-decision decoding of cyclic codes of prime lengths in Galois Fourier transform domain; 17. Polar codes; Appendices.

    1 in stock

    £71.24

  • Introduction to Quantum Cryptography

    Cambridge University Press Introduction to Quantum Cryptography

    1 in stock

    Book SynopsisThis book provides a comprehensive introduction to quantum cryptography for advanced undergraduate and graduate students in computer science, physics, engineering and applied mathematics. Requiring no background in quantum computing, this title includes discussion of both background theory and key, modern applications of quantum cryptography.Trade Review'If you are intrigued by the prospects of quantum cryptography but not yet familiar with the formalism behind it, then this book is the perfect starting point for you. It playfully introduces the most important concepts in modern quantum cryptography, and at the same time gently but purposefully helps you discover the mathematical framework required to make formal statements.' Marco Tomamichel, National University of Singapore'Vidick and Wehner cover quantum cryptography in its full beauty and depth. Packed with enlightening examples and comprehensive exercises, this book will likely become an indispensable companion next time I hold lectures on the subject.' Renato Renner, ETH Zurich'Thomas Vidick and Stephanie Wehner take readers on an insightful exploration of the full landscape of quantum cryptography, skillfully weaving together theory and applications and providing pedagogical quizzes and exercises. The mathematical formalism is rigorous yet approachable, making this book an excellent introduction to this captivating area.' Anne Broadbent, University of OttawaTable of ContentsPreface; 1. Background material; 2. Quantum tools and a first protocol; 3. Quantum money; 4. The power of entanglement; 5. Quantifying information; 6. From imperfect information to (near) perfect security; 7. Distributing keys; 8. Quantum key distribution protocols; 9. Quantum cryptography using untrusted devices; 10. Quantum cryptography beyond key distribution; 11. Security from physical assumptions; 12. Further topics around encryption; 13. Delegated computation; References; Index.

    1 in stock

    £42.74

  • Cryptography

    John Wiley & Sons Inc Cryptography

    7 in stock

    Book SynopsisCryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before. This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems w

    7 in stock

    £103.50

  • Codes and Ciphers  A History Of Cryptography

    15 in stock

    £18.04

  • An Introduction to Mathematical Cryptography

    Springer An Introduction to Mathematical Cryptography

    15 in stock

    Book SynopsisAn Introduction to Cryptography.- Discrete Logarithms and Diffie Hellman.- Integer Factorization and RSA.- Combinatorics, Probability and Information Theory.- Elliptic Curves and Cryptography.- Lattices and Cryptography.- Digital Signatures.- Additional Topics in Cryptography.Trade ReviewFrom the reviews: "The book is devoted to public key cryptography, whose principal goal is to allow two or more people to exchange confidential information … . The material is very well organized, and it is self-contained: no prerequisites in higher mathematics are needed. In fact, everything is explained and carefully covered … . there is abundance of examples and proposed exercises at the end of each chapter. … This book is ideal as a textbook for a course aimed at undergraduate mathematics or computer science students." (Fabio Mainardi, The Mathematical Association of America, October, 2008) "This book focuses on public key cryptography … . Hoffstein, Pipher, and Silverman … provide a thorough treatment of the topics while keeping the material accessible. … The book uses examples throughout the text to illustrate the theorems, and provides a large number of exercises … . The volume includes a nice bibliography. … Summing Up: Highly recommended. Upper-division undergraduate through professional collections." (C. Bauer, Choice, Vol. 46 (7), March, 2009) "For most undergraduate students in mathematics or computer science (CS), mathematical cryptography is a challenging subject. … it is written in a way that makes you want to keep reading. … The authors officially targeted the book for advanced undergraduate or beginning graduate students. I believe that this audience is appropriate. … it could even be used with students who are just learning how to execute rigorous mathematical proofs. … I strongly believe that it finds the right tone for today’s students … ." (Burkhard Englert, ACM Computing Reviews, March, 2009) "The exercises and text would make an excellent course for undergraduate independent study. … This is an excellent book. Hoffstein, Pipher and Silverman have written as good a book as is possible to explain public key cryptography. … This book would probably be best suited for a graduate course that focused on public key cryptography, for undergraduate independent study, or for the mathematician who wants to see how mathematics is used in public key cryptography." (Jintai Ding and Chris Christensen, Mathematical Reviews, Issue 2009 m)Table of ContentsAn Introduction to Cryptography.- Discrete Logarithms and Diffie-Hellman.- Integer Factorization and RSA.- Probability Theory and Information Theory.- Elliptic Curves and Cryptography.- Lattices and Cryptography.- Digital Signatures.- Additional Topics in Cryptology.

    15 in stock

    £49.49

  • Primality Testing and Integer Factorization in PublicKey Cryptography 11 Advances in Information Security

    Springer Us Primality Testing and Integer Factorization in PublicKey Cryptography 11 Advances in Information Security

    1 in stock

    Book SynopsisIntended for advanced level students in computer science and mathematics, this key text, now in a brand new edition, provides a survey of recent progress in primality testing and integer factorization, with implications for factoring based public key cryptography.Trade ReviewFrom the reviews of the second edition:"The well-written and self-contained second edition ‘is designed for a professional audience composed of researchers practitioners in industry.’ In addition, ‘this book is also suitable as a secondary text for graduate-level students in computer science, mathematics, and engineering,’ as it contains about 300 problems. … Overall … ‘this monograph provides a survey of recent progress in Primality Testing and Integer Factorization, with implications in factoring-based Public Key Cryptography.’" (Hao Wang, ACM Computing Reviews, April, 2009)“This is the second edition of a book originally published in 2004. … I used it as a reference in preparing lectures for an advanced cryptography course for undergraduates, and it proved to be a wonderful source for a general description of the algorithms. … the book will be a valuable addition to any good reference library on cryptography and number theory … . It contains descriptions of all the main algorithms, together with explanations of the key ideas behind them.” (S. C. Coutinho, SIGACT News, April, 2012)Table of ContentsPreface to the Second Edition.- Preface to the First Edition.- Number-Theoretic Preliminaries.- Problems in Number Theory. Divisibility Properties. Euclid's Algorithm and Continued Fractions. Arithmetic Functions. Linear Congruences. Quadratic Congruences. Primitive Roots and Power Residues. Arithmetic of Elliptic Curves. Chapter Notes and Further Reading.- Primality Testing and Prime Generation.- Computing with Numbers and Curves. Riemann Zeta and Dirichlet L Functions. Rigorous Primality Tests. Compositeness and Pseudoprimality Tests. Lucas Pseudoprimality Test. Elliptic Curve Primality Tests. Superpolynomial-Time Tests. Polynomial-Time Tests. Primality Tests for Special Numbers. Prime Number Generation. Chapter Notes and Further Reading.- Integer Factorization and Discrete Logarithms.- Introduction. Simple Factoring Methods. Elliptic Curve Method (ECM). General Factoring Congruence. Continued FRACtion Method (CFRAC). Quadratic Sieve (QS). Number Field Sieve (NFS). Quantum Factoring Algorithm. Discrete Logarithms. kth Roots. Elliptic Curve Discrete Logarithms. Chapter Notes and Further Reading.- Number-Theoretic Cryptography.- Public-Key Cryptography. RSA Cryptosystem. Rabin Cryptography. Quadratic Residuosity Cryptography. Discrete Logarithm Cryptography. Elliptic Curve Cryptography. Zero-Knowledge Techniques. Deniable Authentication. Non-Factoring Based Cryptography. Chapter Notes and Further Reading.- Bibliography.- Index.- About the Author.

    1 in stock

    £123.25

  • Nuclear Scholars Initiative

    Centre for Strategic & International Studies,U.S. Nuclear Scholars Initiative

    Out of stock

    Book SynopsisAddressing an increasingly complex array of nuclear weapons challenges in the future will require talented young people with the necessary technical and policy expertise to contribute to sound decisionmaking on nuclear issues over time. To that end, the CSIS Project on Nuclear Issues (PONI) runs a yearly Nuclear Scholars Initiative for graduate students and young professionals. Those accepted into the program are hosted once per month at CSIS in Washington, DC, where they participate in daylong workshops with senior government officials and policy experts. Over the course of the six-month program, scholars are required to prepare a research paper. This volume is a collection of the 2014 papers from the Nuclear Scholars Initiative.

    Out of stock

    £43.20

  • Providing Sound Foundations for Cryptography On

    Morgan & Claypool Publishers Providing Sound Foundations for Cryptography On

    15 in stock

    Book SynopsisThe design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed in works -authored by Shafi Goldwasser and/or Silvio Micali. This book celebrates these works, and reproduces some of them.Table of Contents Preface Acknowledgments Photo and Text Credits PART I BIOGRAPHIES, INTERVIEWS, AND AWARD LECTURES A Story Behind Every Problem: A Brief Biography of Shafi Goldwasser One Obsession at a Time: A Brief Biography of Silvio Micali An Interview with Shafi Goldwasser An Interview with Silvio Micali The Cryptographic Lens: Shafi Goldwasser's Turing Lecture Proofs, According to Silvio: Silvio Micali's Turing Lecture PART II ORIGINAL PAPERS Probabilistic Encryption The Knowledge Complexity of Interactive Proof Systems How to Generate Cryptographically Strong Sequences of Pseudorandom Bits How to Construct Random Functions A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks Proofs that Yield Nothing but Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems How to Play Any Mental Game: A Completeness Theorem for Protocols with Honest Majority Non-Interactive Zero-Knowledge (NIZK) Proof Systems Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation Multi-Prover Interactive Proofs: How to Remove Intractability Assumptions PART III PERSPECTIVES On the Foundations of Cryptography On the Impact of Cryptography on Complexity Theory On Some Noncryptographic Works of Goldwasser and Micali Fundamentals of Fully Homomorphic Encryption Interactive Proofs for Lattice Problems Following a Tangent of Proofs A Tutorial on Concurrent Zero-Knowledge Doubly Efficient Interactive Proofs Computational Entropy A Survey of Leakage-Resilient Cryptography Editor and Author Biographies

    15 in stock

    £92.70

  • Providing Sound Foundations for Cryptography On

    Morgan & Claypool Publishers Providing Sound Foundations for Cryptography On

    15 in stock

    Book SynopsisThe design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed in works -authored by Shafi Goldwasser and/or Silvio Micali. This book celebrates these works, and reproduces some of them.Table of Contents Preface Acknowledgments Photo and Text Credits PART I BIOGRAPHIES, INTERVIEWS, AND AWARD LECTURES A Story Behind Every Problem: A Brief Biography of Shafi Goldwasser One Obsession at a Time: A Brief Biography of Silvio Micali An Interview with Shafi Goldwasser An Interview with Silvio Micali The Cryptographic Lens: Shafi Goldwasser's Turing Lecture Proofs, According to Silvio: Silvio Micali's Turing Lecture PART II ORIGINAL PAPERS Probabilistic Encryption The Knowledge Complexity of Interactive Proof Systems How to Generate Cryptographically Strong Sequences of Pseudorandom Bits How to Construct Random Functions A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks Proofs that Yield Nothing but Their Validity or All Languages in NP Have Zero-Knowledge Proof Systems How to Play Any Mental Game: A Completeness Theorem for Protocols with Honest Majority Non-Interactive Zero-Knowledge (NIZK) Proof Systems Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation Multi-Prover Interactive Proofs: How to Remove Intractability Assumptions PART III PERSPECTIVES On the Foundations of Cryptography On the Impact of Cryptography on Complexity Theory On Some Noncryptographic Works of Goldwasser and Micali Fundamentals of Fully Homomorphic Encryption Interactive Proofs for Lattice Problems Following a Tangent of Proofs A Tutorial on Concurrent Zero-Knowledge Doubly Efficient Interactive Proofs Computational Entropy A Survey of Leakage-Resilient Cryptography Editor and Author Biographies

    15 in stock

    £77.40

  • Democratizing Cryptography

    Morgan & Claypool Publishers Democratizing Cryptography

    15 in stock

    Book SynopsisWhile other books have documented the development of public key cryptograpy, this is the first to provide a comprehensive insiders’ perspective on the full impacts of public key cryptography, including six original chapters by nine distiguished scholars.

    15 in stock

    £62.10

  • A Life in Code

    McFarland & Co Inc A Life in Code

    Out of stock

    Book Synopsis Protesters called it an act of war when the U.S. Coast Guard sank a Canadian-flagged vessel in the Gulf of Mexico in 1929. It took a cool-headed codebreaker solving a trunk-full of smugglers'' encrypted messages to get Uncle Sam out of the mess: Elizebeth Smith Friedman''s groundbreaking work helped prove the boat was owned by American gangsters. This book traces the career of a legendary U.S. law enforcement agent, from her work for the Allies during World War I through Prohibition, when she faced danger from mobsters while testifying in high profile trials. Friedman founded the cryptanalysis unit that provided evidence against American rum runners and Chinese drug smugglers. During World War II, her decryptions brought a Japanese spy to justice and her Coast Guard unit solved the Enigma ciphers of German spies. Friedman''s all source intelligence model is still used by law enforcement and counterterrorism agencies against 21st century threats.

    Out of stock

    £20.89

  • Blockchain Basics

    Apress Blockchain Basics

    Out of stock

    Book SynopsisStage 1: Terminology and Technical Foundations.- Step 1: Thinking in Layers and Aspects.- Step 2: Seeing the Big Picture.- Step 3: Recognizing the Potential.- Stage 2: Why the Blockchain Is Needed.- Step 4: Discovering the Core Problem.- Step 5: Disambiguating the Term.- Step 6: Understanding the Nature of Ownership.- Step 7: Spending Money Twice.- Stage 3: How the Blockchain Works.- Step 8: Planning the Blockchain.- Step 9: Documenting Ownership.- Step 10: Hashing Data.- Step 11: Hashing in the Real World.- Step 12: Identifying and Protecting User Accounts.- Step 13: Authorizing Transactions.- Step 14: Storing Transaction Data.- Step 15: Using the Data Store.- Step 16: Protecting the Data Store.- Step 17: Distributing the Data Store Among Peers.- Step 18: Verifying and Adding Transactions.- Step 19: Choosing a Transaction History.- Step 20: Paying for Integrity.- Step 21: Bringing the Pieces Together.- Stage 4: Limitations and Their Solutions.- Step 22: Seeing the Limitations.- SteTrade Review“The book is really what is says to be – it introduces the “Blockchain Basics” without formulas or programming. And still, does it in a serious way, which allows you to “take home” the knowledge after reading it.” (vitoshacademy.com , May, 2018)“The book could be used as a textbook or simply to help structure a presentation on blockchain. … I think that the book achieves its objectives: to explain to a nontechnical audience what the blockchain is, how it works, and where it can be applied. It should also allow the reader to understand a lot of the hype that surrounds blockchain and to differentiate the ways in which the term is used.” (Computing Reviews, October, 2017)“This book presents a very intuitive and comprehensive introduction to the blockchain technology. It is useful to understand the concept and to find analogies to explain blockchain to people that are not familiar with it. The book is concisely written and well structured, so that the reader can easily follow and understand the presented concepts.” (Nicolas Kube, Financial Markets and Portfolio Management, Vol. 32, 2018)Table of ContentsStage 1: Terminology and Technical Foundations.- Step 1: Thinking in Layers and Aspects.- Step 2: Seeing the Big Picture.- Step 3: Recognizing the Potential.- Stage 2: Why the Blockchain Is Needed.- Step 4: Discovering the Core Problem.- Step 5: Disambiguating the Term.- Step 6: Understanding the Nature of Ownership.- Step 7: Spending Money Twice.- Stage 3: How the Blockchain Works.- Step 8: Planning the Blockchain.- Step 9: Documenting Ownership.- Step 10: Hashing Data.- Step 11: Hashing in the Real World.- Step 12: Identifying and Protecting User Accounts.- Step 13: Authorizing Transactions.- Step 14: Storing Transaction Data.- Step 15: Using the Data Store.- Step 16: Protecting the Data Store.- Step 17: Distributing the Data Store Among Peers.- Step 18: Verifying and Adding Transactions.- Step 19: Choosing a Transaction History.- Step 20: Paying for Integrity.- Step 21: Bringing the Pieces Together.- Stage 4: Limitations and Their Solutions.- Step 22: Seeing the Limitations.- Step 23: Reinventing the Blockchain.- Stage 5: Using the Blockchain, Summary, and Outlook Step 24: Using the Blockchain.-Step 25: Summarizing and Going Further.- Bibliography.-

    Out of stock

    £25.19

  • Codeless Data Structures and Algorithms

    APress Codeless Data Structures and Algorithms

    1 in stock

    Book SynopsisTable of ContentsPart 1: Data Structures.- Chapter 1: Intro to DSA, Types and Big-O.- Chapter 2: Linear Data Structures.- Chapter 3: Tree Data Structures.- Chapter 4: Hash Data Structures.- Chapter 5: Graphs.- Part 2: Algorithms.- Chapter 6: Linear and Binary Search.- Chapter 7: Sorting Algorithms.- Chapter 8: Searching Algorithms.- Chapter 9: Clustering Algorithms.- Chapter 10: Randomness.- Chapter 11: Scheduling Algorithms.- Chapter 12: Algorithm Planning and Design.- Appendix A: Going Further.-

    1 in stock

    £29.99

  • The Quiet Crypto Revolution

    APress The Quiet Crypto Revolution

    1 in stock

    Book SynopsisCrypto is going to change the world, and for those tired of confusing financial jargon and complicated technical terminology, look no further. This book demystifies the world of cryptocurrencies and blockchain technology and explains in accessible language how it will affect your daily life. In The Quiet Crypto Revolution, Klaas Jung dives beneath the surface of Bitcoin to explore the engine that powers it - blockchain. Far surpassing the confines of cryptocurrencies, blockchain's potential for wide-ranging applications is enormous. It's crucial to understand that cryptocurrencies are merely a single manifestation of blockchain's capabilities. This book casts light on the broader spectrum of blockchain applications and the exciting future of this groundbreaking technology. With a focus on real-world applications, you'll gain a deeper understanding of the key concepts behind the innovative technology of blockchain, equipping you to make informed decisions. Whether you're a tech-savvy iTable of Contents1. Introduction to The Crypto Revolution.- 2. Understanding the Blockchain.- 3. The future of blockchain technology.- 4. Cryptocurrency in Practice.- 5. The Future of Decentralized Finance.- 6. Security and Scams.- 7. Crypto Pioneers: Exploring Entrepreneurial Opportunities.- 8. Final Thoughts: The Future of Crypto.

    1 in stock

    £18.99

  • Still Searching for Satoshi

    APress Still Searching for Satoshi

    1 in stock

    Book SynopsisWe are at the threshold of a new area of the internet that promises to transform the way we engage financially and take the power of data and privacy back from big corporations and give it to the individual through decentralization. This is sometimes called Web 3.0. While Web 1.0 transformed information sharing and commerce and brought us giants like Google and Amazon and Web 2.0 unlocked the social potential of the internet and created Facebook, Twitter, and Snapchat, exactly what will come of Web 3.0 remains to be seen. It is indisputable that the seed of Web 3.0 is the technological, social, and economic innovations that came together in Bitcoin and the blockchain technology it created. But where the first web iterations were relatively straightforward to understand, the inner workings of Web 3.0 remain more opaque and shrouded in mystique. Current voices on Bitcoin and the blockchain revolution fall squarely into one of two camps; either technological experts who are all also invTable of ContentsIntroduction Part 1 - Genealogy of bitcoin technology The technological developments leading to bitcoin. This part is a technological history that reviews the technological developments that Bitcoin builds on. There are a few strands that developed more or less independently that combine into Bitcoin. Once they are explained it is possible to give a deeper explanation of how Bitcoin works. This understanding will inform the remaining parts of the book. Chapter 1: Cryptography The purpose of cryptography is to keep information private by preserving confidentiality, integrity and access to it. Public private key encryption Hashing Zero knowledge proof Chapter 2: Virtual Money In this chapter we will go into the history of electronic or virtual money before bitcoin. Digicash E gold Bitgold b Money Hash cash Chapter 3: Peer-to-peer technology The internet of today is a centralized type of computing working through a number of web servers that function in a hierarchy. Properties of p2p networks Discovering a peer Secure sharing File Sharing from Napster to BitTorrent Chapter 4: Proof of work An inherent problem with the networked world is that accessing and processing information is essentially free, which makes certain types of disruptive behavior easy, which we see in denial of service attacks, spam mail and robocalling. This brings new problems that did not exist when it cost significant money to send a letter, read a paper or book or make a phone call. DDoS Spam Money transactions Chapter 5: Public record Since the time of the code of Hammurabi, the purpose of a public record has been clear: to establish indisputable truth. While this is seemingly the opposite of the privacy and confidentiality entailed by cryptography it serves the purpose of making information shared and immutable. Historical technologies of public record The purpose of public records The accounting revolution and the development of ledgers, double entry bookkeeping to triple entry bookkeeping Chapter 6: Bitcoin From the previous chapters we are now able to piece together how bitcoin and the block chain works. Virtual money - The Bitcoin Encrypting for privacy - The Wallet Public record - The Blockchain Peer to peer network - The Miners Proof of work - Transactions (cryptographic proof and the consensus algorithm) Part 2 - Still searching for Satoshi - who is the historical Satoshi Nakamoto? Much writing about Bitcoin has focused on who the historical person or persons behind Satoshi Nakamoto is. This part will apply a historical critical perspective to this question and sift through the evidence in order to create a better understanding of what we can and cannot say about the identity of Satoshi Nakamoto. Chapter 7: Who dunnit? A review of previous identifications of the person behind Satoshi. This has previously taken the shape of investigative journalism in the style of true crime reporting Joshua Davis, The New Yorker 2011 Adam Penenberg, Fast Company 2011 Alec Liu, Vice 2013 John Markoff, New York Times 2013 Andy Greenberg, Forbes 2014 Leah McGrath Goodman, Newsweek 2014 Skye Grey, blog 2014 Dominic Frisby, Bitcoin the future of money 2014 Nathaniel Popper, New York Time 2015 Andy Greenberg, Gwern Branwen, Wired 2015 Sam Biddle, Gizmodo 2015 Izabella Kasminska, Financial Times 2016 Evan Ratliff, Wired 2019 Other sources - twitter, youtube, tv Chapter 8: Ad fontes-What do the sources say? By focusing on the sources we are able to extract a number of key characteristics to look for: Historical analysis - establishes a couple of key points for historical analysis The bitcoin whitepaper - the most crucial piece of evidence The forums - the p2p forum and later the bitcoin forum are sources where Satoshi discussed with peers about bitcoin The code - the code in itself may also contain clues The blockchain - the record of transactions also provides an insight into the origin of bitcoin Summary - what can the sources tell us? Chapter 9: Motives What were the motives behind the creation of bitcoin Ideology - what can be said about the ideology of the author based on extant sources? Why the synonym? - what could be the reason for the initial and continued secrecy surrounding the inventor? Summary - why did the inventor invent bitcoin and in this particular way? Chapter 10: The social network of early bitcoin Who were the people involved in the beginning of Bitcoin p2p forum communication Bitcoin forum communication Blockchain transactions Summary - what can we learn from looking at the bitcoin initial network Chapter 11: The usual suspects? Rather than pointing definitively to one or another suspect we will try to integrate the knowledge we have gained with the list of known suspects. An evaluation framework - developing an evaluation framework against which to measure the likelihood of any candidate being Satoshi Nakamoto Prime suspects - the suspects that have gained most attention · Hal Finney · Nick Szabo · Dorian Sakamoto · Craig Wright and David Kleiman · Paul Leroux Secondary suspects - suspects that have gained some attention · Vili Lehdonum and Michael Clear · Neal King, Vladimir Oksman, Charles Bry · Hal Finney, Nick Szabo and Adam Back · Shinichi Mochizuki · Ross Ulbricht · Adam Back · Gavin Andresen · Jed McCaleb · Elon Musk · Len Sassaman · Someone else A new primary suspect - as in the movie The Usual Suspects, careful analysis points towards a surprising suspect who is not in the primary field of suspects. Part 3 - Bitcoin in context How is bitcoin viewed in the wider context of human civilization? Bitcoin does not exist in a technological bubble addressing only technological issues. It is firmly situated in a web of themes that are and have been central to human civilization. This may account for its notoriety but needs to be put in context. Chapter 12: Money Since prehistoric times humans have engaged in exchange. This falls in a continuum from barter, through intermediaries as cowry shells, gold and silver coins to purely symbolic means of exchange. The history of money Medium of exchange Unit of account Standard of deferred payment Store of value Types of money · Commodity · Representative money · Fiat · Digital money · Deposits The politics of money Money as a bridge between domains of value Chapter 13: Ownership Proving that you own something has been a central feature of human societies for millenia and disputes have fueled more than its share of violence and conflict. Owners · Private · Public · Corporate · Communal Property · Tangible · Intangible Establishing and policing ownership · National · Transnational Chapter 14: Social organization Human societies have always been characterized by some sort of social organization. The different options have been debated since classical antiquity. This chapter will take a look at the space of social organization and narrow it down to the particular types associated with bitcoin and blockchain. An ancient discussion: Monarchy, Oligarchy and Democracy - and anarchy Centralization vs decentralization Types of social organization in human groups Open source Cypher punks Chapter 15: Religion A rarely debated issue are the religious aspects surrounding Bitcoin and the blockchain movement. But these aspects are nothing new when it comes to human cultures. Understanding this helps explain a lot of the seemingly strange behavior of bitcoin believers without claiming that Bitcoin is an actual religion. The prophet - Satoshi Nakamoto Sacred scriptures- The Bitcoin whitepaper and the forum posts Believers and heathens Cargo cults Millenarianism Part 4 - Blockchain and the future Where can blockchain technology be applied? Where, if anywhere, might we see cryptocurrencies and the blockchain in the future and how might it affect our lives? A case could be made that we are only in the beginning phases of the blockchain now, sometimes called Web3, where the worst of the teething problems are gone and the wild west ethos is receding. Where not to use blockchain - First let us consider a number of areas where blockchain is currently suggested that might not be particularly relevant. Parameters to be tweaked - Bitcoin was the first version of blockchain technology and certain choices were made. But subsequent and future blockchains need not make the same choices. We need to understand how this can be done in order to ascertain the future utility of the blockchain. Transaction speed Energy consumption Degree of centralization Public availability Mining rewards Banking - even though Bitcoin at its outset was antithetical to the banking industry there are particularly good use cases here. Payment - bitcoin may not in itself have been very successful as a payments solution so far but there is no reason why another cryptocurrency will not be. Current payment systems are slow and expensive compared to what the blockchain can offer. International payments Remittance Peer to peer payments Micropayments Certification - building on the ability to serve as a public record there are good reasons that a blockchain can serve as a public record for information about ownership NFTs Real estate Media Contracts - the ability to establish indisputable truth makes it possible to build contracts that automatically execute according to some logic. This can be used for escrow services and delivery of other services as well as insurance. Regulatory compliance - the immutability of the blockchain makes it good for a great number of use cases where fraud has previously been an issue Forensics - the public nature of the blockchain makes it a valuable tool for law enforcement, especially international law enforcement, which has already proven its worth in a number of high profile cases. Supply chain - the blockchain is well suited for keeping track of things movement across time and place. Health - keeping track of health trackers and personal health records could be done on a blockchain Government - in government there are also areas where blockchain may be useful Special purpose tokens Voting Identity Glossary Key concepts described

    1 in stock

    £38.24

  • Introduction to Biometrics

    Springer-Verlag New York Inc. Introduction to Biometrics

    3 in stock

    Book SynopsisWhile the deployment of large-scale biometric systems in both commercial and government applications has increased the public awareness of this technology, "Introduction to Biometrics" is the first textbook to introduce the fundamentals of Biometrics to undergraduate/graduate students.Table of ContentsIntroduction.- Fingerprint Recognition.- Face Recognition.- Iris Recognition.- Additional Biometric Traits.- Multibiometrics.- Security of Biometric Systems.

    3 in stock

    £49.49

  • Decentralized Applications

    O'Reilly Media Decentralized Applications

    1 in stock

    Book SynopsisTake advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used-and profitable-than today's most popular web apps.

    1 in stock

    £23.24

  • HandsOn Smart Contract Development with Solidity

    O'Reilly Media HandsOn Smart Contract Development with Solidity

    3 in stock

    Book SynopsisReady to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum—the open source blockchain-based distributed computing platform.

    3 in stock

    £39.74

  • Mastering Corda

    O'Reilly Media Mastering Corda

    1 in stock

    Book SynopsisUsing this book, anyone from a complete blockchain beginner to an experienced blockchain or enterprise architect can rapidly understand and write applications like a pro while exploring the technical nuances and intricacies of the Corda platform.

    1 in stock

    £47.99

  • Mastering Blockchain

    O'Reilly Media Mastering Blockchain

    1 in stock

    Book SynopsisThis detailed guide distills the complex, fast moving ideas behind blockchain into an easily digestible reference manual, showing what's really going on under the hood.

    1 in stock

    £47.99

  • Elements of Quasigroup Theory and Applications

    Taylor & Francis Inc Elements of Quasigroup Theory and Applications

    Out of stock

    Book SynopsisUnderstanding Interaction is a book that explores the interaction between people and technology, in the broader context of the relations between the human made and the natural environments.It is not just about digital technologies our computers, smart phones, the Internet but all our technologies such as mechanical, electrical and electronic. Our ancestors started creating mechanical tools and shaping their environments millions of years ago, developing cultures and languages, which in turn influenced our evolution. Volume 1 of Understanding Interaction looks into this deep history starting from the tool creating period (the longest and most influential on our physical and mental capacities), to the settlement period (agriculture, domestication, villages and cities, written language), the industrial period (science, engineering, reformation and renaissance), and finally the communication period (mass media, digital technologies, global networks).VolumeTable of Contents Preface introduction, overview of chapters of Vol I & II 1. Interacting - overview of design and research for interaction 2. Evolving - technocultural periods, and technology categories 3. Creating - dedicated tool making, and the emergence of language 4. Settling - agriculture, mechanical tools, and writing 5. Industrialising - science, enlightenment, reformation, and renaissance 6. Communicating - information, representation, semiotics Interface - preliminary frameworks and directions References

    Out of stock

    £147.25

  • The United States of Anonymous

    Cornell University Press The United States of Anonymous

    10 in stock

    Book SynopsisIn The United States of Anonymous, Jeff Kosseff explores how the right to anonymity has shaped American values, politics, business, security, and discourse, particularly as technology has enabled people to separate their identities from their communications. Legal and political debates surrounding online privacy often focus on the Fourth Amendment''s protection against unreasonable searches and seizures, overlooking the history and future of an equally powerful privacy right: the First Amendment''s protection of anonymity. The United States of Anonymous features extensive and engaging interviews with people involved in the highest profile anonymity cases, as well as with those who have benefited from, and been harmed by, anonymous communications. Through these interviews, Kosseff explores how courts have protected anonymity for decades and, likewise, how law and technology have allowed individuals to control how much, if any, identifying infTrade ReviewAmid surging social media and online speech wars, readers concerned about the future of free speech, privacy, and the law will appreciate Kosseff's ability to deftly place the many-sided anonymity debate in the context of constitutional values and social norms. * Library Journal *Table of ContentsIntroduction Part I: Developing the Right to Anonymity 1. America, the Anonymous 2. Empowering Anonymous Association 3. Empowering Anonymous Speech 4. The Scope of Anonymity Empowerment 5. Antimask Part II: The Right to Online Anonymity 6. Cybersmear 7. Setting the Rules for Online Anonymity 8. Online Anonymity and Copyright 9. When the Government Wants to Unmask You 10. Anonymity Worldwide 11. Technological Protections for Anonymity Part III: Living in an Anonymous World 12. Anonymity as a Shield 13. Anonymity as a Sword Part IV: The Future of Anonymity 14. Real-Name Policies 15. Out in the Open 16. Empowering Anonymity through Privacy Law Conclusion

    10 in stock

    £21.84

  • Bloomsbury Professional Law Insight -

    Bloomsbury Publishing PLC Bloomsbury Professional Law Insight -

    5 in stock

    Book SynopsisThis book explores the specialist area of cryptocurrency in the context of matrimonial finance proceedings. The work is split into two parts. The first part provides a comprehensive primer on cryptocurrency and blockchain technology. It explains what cryptocurrencies are, how they are held by their owners, and how blockchain technology works. This part also considers the legal status and current regulatory treatment of cryptocurrency in England and Wales. The second part provides an overview of financial remedies and the distributive principles applied by the Family Court in matrimonial finance cases. It analyses the current case law on cryptocurrencies as a variety of ‘property’, before exploring issues that practitioners may face when encountering crypto-assets in litigation. This includes the challenges of valuing, tracing, and freezing cryptocurrency, as well as disclosure considerations. The work includes an overview of the principles relating to ‘self-help’ disclosure and associated criminal offences pursuant to the Computer Misuse Act 1990 and the Data Protection Act 2018. It also contains a summary of HMRC’s current guidance on the taxation of crypto-assets for individuals. This title is included in Bloomsbury Professional's Family Law and Cyber Law online services.Table of Contents1. Introduction 2. An Introduction to Cryptocurrency a. Introduction b. Types of cryptoassets c. What is cryptocurrency? d. Comparing transaction systems: ‘traditional’ finance v cryptocurrency e. The legal status of cryptocurrency in the United Kingdom f. Case study: the evolution of Bitcoin 3. Blockchain a. Introduction b. What is blockchain? c. How blockchain works d. The consensus mechanism e. Advantages and disadvantages of blockchain f. Applications of blockchain technology g. Smart contracts h. Non-Fungible Tokens 4. The Cryptocurrency Ecosystem a. Introduction b. Key players and key terms c. Top 10 cryptocurrencies by market capitalisation: Bitcoin, Ethereum, Tether, USD Coin, BNB, Cardano, XRP, Binance USD, Solana, Dogecoin 5. Regulation of cryptocurrency in the United Kingdom a. Introduction b. The FCA regulatory perimeter c. Financial regulation by category: security tokens, e-money tokens, exchange tokens, utility tokens, stablecoins d. AML / CTF financing e. Regulatory developments in the UK 6. Overview of financial remedies in matrimonial finance a. Introduction b. The Court’s powers and statutory discretion c. The distributive principles d. Matrimonial and non-matrimonial property e. Special contributions f. Income g. Summary 7. Cryptocurrency as a matrimonial asset a. Are cryptocurrencies ‘property’ and why does it matter? b. Are cryptocurrencies divisible? c. Disclosure on Form E 8. Practical considerations in litigation a. Introduction b. Identifying and tracing cryptocurrency c. Valuation of cryptocurrency d. Disclosure, freezing orders, and preservation of devices e. Self-help disclosure and associated criminal offences f. Taxation

    5 in stock

    £57.00

  • Serious Cryptography: A Practical Introduction to

    No Starch Press,US Serious Cryptography: A Practical Introduction to

    2 in stock

    Book SynopsisSerious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work. Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and post-quantum cryptography. Numerous code examples and real use cases throughout will help practitioners to understand the core concepts behind modern cryptography, as well as how to choose the best algorithm or protocol and ask the right questions of vendors. Aumasson discusses core concepts like computational security and forward secrecy, as well as strengths and limitations of cryptographic functionalities related toTrade Review“A superb introduction to modern encryption and cryptography. For those looking to quickly get up to speed on the topics, this makes for an excellent go-to guide.”—Ben Rothke, RSA Conference“It's really a love letter to cryptography.”—Nadim Kobeissi“For those who really want to understand how cryptography works, and who need to use it in practice, I thoroughly recommend Serious Cryptography.”—Martijn Grooten, Virus Bulletin“Impressive in its breadth...the state of the art in applied cryptography is distilled here in a mere 282 pages.”—Federico Lucifredi, The Hub“Aumasson successfully ensures that the reader has a strong understanding of cryptography’s core ideas... Serious Cryptography is a must read for anyone wanting to enter cryptographic engineering.”—Infosecurity Magazine“Each chapter not only explains concepts and key implementation details, but also highlights possible pitfalls, common mistakes, and finishes with a list of recommended materials.”—Artificial Truth"Jean-Philippe Aumasson's Serious Cryptography is a classic (and serious) introduction to the field."—Mary Branscombe, ZDNet"It's advanced but the best book I've ever read for PKI is Serious Cryptography by Aumasson. Probably don't want to start with it but if you get serious you'll want to read it."—Chris Sandvick, @ChrisSandvick"My favorite reference."—Colin O'Flynn, Circuit Cellar"For those wanting to go beyond the basics of cryptography in the blockchain, 'Serious Cryptography' by Jean-Philippe Aumasson is an invaluable resource."—Halborn SecurityTable of ContentsForeword by Matthew D. GreenPrefaceAbbreviationsChapter 1: EncryptionChapter 2: RandomnessChapter 3: Cryptographic SecurityChapter 4: Block CiphersChapter 5: Stream CiphersChapter 6: Hash FunctionsChapter 7: Keyed HashingChapter 8: Authenticated EncryptionChapter 9: Hard ProblemsChapter 10: RSAChapter 11: Diffie–HellmanChapter 12: Elliptic CurvesChapter 13: TLSChapter 14: Quantum and Post-QuantumIndex

    2 in stock

    £35.99

  • New Trends in Cryptographic Systems

    Nova Science Publishers Inc New Trends in Cryptographic Systems

    1 in stock

    Book SynopsisCryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that its content can only be disclosed to some qualified persons. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, it has expanded in two main ways: firstly, it provides mechanisms for more than just keeping secrets through schemes like digital signatures, digital cash, etc; secondly, cryptography is used by almost all computer users as it is embedded into the infrastructure for computing and telecommunications. Cryptography ensures secure communications through confidentiality, integrity, authenticity and non-repudiation. Cryptography has evolved over the years from Julius Cesar''s cipher, which simply shifts the letters of the words a fixed number of times, to the sophisticated RSA algorithm, which was invented by Ronald L. Rivest, Adi Shamir and Leonard M. Adleman, and the elegant AES cipher (Advanced Encryption Standard), which was invented by Joan Daemen and Vincent Rijmen. The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware for cryptography is becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, embedded cryptographic hardware became cost-effective. Nevertheless, it is worthy to note that nowadays, even hardwired cryptographic algorithms are not safe. Attacks based on power consumption and electromagnetic Analysis, such as SPA, DPA and EMA have been successfully used to retrieve secret information stored in cryptographic devices. Besides performance in terms of area and throughput, designer of embedded cryptographic hardware must worry about the leakage of their implementations. The content of this book is divided into three main parts, which are focused on new trends in cryptographic hardware, arithmetic and factoring.

    1 in stock

    £173.24

  • Cryptography for Developers

    Syngress Media,U.S. Cryptography for Developers

    15 in stock

    Book SynopsisThe only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.Table of ContentsIntroduction; ASN.1 Encodings; Random Numbers; Large Integer Arithmetic; Symmetric Key Ciphers; One-Way Hashes; Message Authentication Codes; Encrypted Authentication Modes; Public-Key Cryptography

    15 in stock

    £53.76

  • Current Research Topics on Galois Geometrics

    Nova Science Publishers Inc Current Research Topics on Galois Geometrics

    1 in stock

    Book SynopsisGalois geometry is the theory that deals with substructures living in projective spaces over finite fields, also called Galois fields. This collected work presents current research topics in Galois geometry, and their applications. Presented topics include classical objects, blocking sets and caps in projective spaces, substructures in finite classical polar spaces, the polynomial method in Galois geometry, finite semifields, links between Galois geometry and coding theory, as well as links between Galois geometry and cryptography.

    1 in stock

    £166.49

  • Programming with Types

    Manning Publications Programming with Types

    15 in stock

    Book Synopsis

    15 in stock

    £35.99

  • Ad Hoc Anonymous Signatures: State of the Art,

    Nova Science Publishers Inc Ad Hoc Anonymous Signatures: State of the Art,

    Out of stock

    Book Synopsis

    Out of stock

    £146.24

  • Hygiene in a Globalized & Post-Antibiotic World:

    Nova Science Publishers Inc Hygiene in a Globalized & Post-Antibiotic World:

    1 in stock

    Book SynopsisIn a globalised and post-antibiotic world, it will be difficult to prevent the spread of infections and pathogens that have historically been largely controllable and treatable. In this scenario, efforts to improve public health will intensify the general trend to move away from sickness treatment to illness prevention and health promotion, as well as increased attention to personal and collective hygiene. This development exposes a potential problem in scholarly literature: much of what we know about influencing what people know about hygiene and why they engage in hygiene behaviour is based on very specific contexts (eg: hospitals and healthcare facilities) and populations (eg: children and healthcare workers). Enter the field of hygiene psychology, which is based on linking the best practices in personal hygiene with relevant personality and contextual factors supported by rigorous and innovative psychological research. We know what people must do to maintain good hygiene, but we must draw from psychology to translate this knowledge into promoting key hygiene behaviours. This book will make these connections by applying psychological principles and research methods to understanding, and affecting, hygiene behaviour change for a number of specific contexts.

    1 in stock

    £69.74

  • Practical Cryptography

    Murphy & Moore Publishing Practical Cryptography

    Out of stock

    Book Synopsis

    Out of stock

    £108.11

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account