Author: Herong Yang
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 469
Book Description
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive/multiplicative notations; EC as Abelian groups; DLP (Discrete Logarithm Problem) and trapdoor function; Galois fields or finite fields with Additive/Multiplicative Abelian Group; Prime fields, binary fields, and polynomial fields; EC fields reduced with modular arithmetic; EC subgroup and base points; EC private key and public key pairs; ECDH (Elliptic Curve Diffie-Hellman) protocol; ECDSA (Elliptic Curve Digital Signature Algorithm); ECES (Elliptic Curve Encryption Scheme) protocol; Java tool/program to generate EC keys. Updated in 2024 (Version v1.03) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/EC-Cryptography.
EC Cryptography Tutorials - Herong's Tutorial Examples
Author: Herong Yang
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 469
Book Description
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive/multiplicative notations; EC as Abelian groups; DLP (Discrete Logarithm Problem) and trapdoor function; Galois fields or finite fields with Additive/Multiplicative Abelian Group; Prime fields, binary fields, and polynomial fields; EC fields reduced with modular arithmetic; EC subgroup and base points; EC private key and public key pairs; ECDH (Elliptic Curve Diffie-Hellman) protocol; ECDSA (Elliptic Curve Digital Signature Algorithm); ECES (Elliptic Curve Encryption Scheme) protocol; Java tool/program to generate EC keys. Updated in 2024 (Version v1.03) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/EC-Cryptography.
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 469
Book Description
This EC (Elliptic Curve) cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include rule of chord and point addition on elliptic curves; Abelian groups with additive/multiplicative notations; EC as Abelian groups; DLP (Discrete Logarithm Problem) and trapdoor function; Galois fields or finite fields with Additive/Multiplicative Abelian Group; Prime fields, binary fields, and polynomial fields; EC fields reduced with modular arithmetic; EC subgroup and base points; EC private key and public key pairs; ECDH (Elliptic Curve Diffie-Hellman) protocol; ECDSA (Elliptic Curve Digital Signature Algorithm); ECES (Elliptic Curve Encryption Scheme) protocol; Java tool/program to generate EC keys. Updated in 2024 (Version v1.03) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/EC-Cryptography.
Cryptography Tutorials - Herong's Tutorial Examples
Author: Herong Yang
Publisher: Lulu.com
ISBN: 0359434789
Category : Computers
Languages : en
Pages : 354
Book Description
This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include MD5 and SHA1 message digest algorithms and implementations, DES, Blowfish and AES secret key cipher algorithms and implementations, RSA and DSA public key encription algorithms and implementations, Java and PHP cryptography APIs, OpenSSL, keytool and other cryptography tools, PKI certificates and Web browser supports.Updated in 2019 (Version Version 5.40) with Java 12. For latest updates and free sample chapters, visit http://www.herongyang.com/Cryptography.
Publisher: Lulu.com
ISBN: 0359434789
Category : Computers
Languages : en
Pages : 354
Book Description
This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include MD5 and SHA1 message digest algorithms and implementations, DES, Blowfish and AES secret key cipher algorithms and implementations, RSA and DSA public key encription algorithms and implementations, Java and PHP cryptography APIs, OpenSSL, keytool and other cryptography tools, PKI certificates and Web browser supports.Updated in 2019 (Version Version 5.40) with Java 12. For latest updates and free sample chapters, visit http://www.herongyang.com/Cryptography.
Java GC Tutorials - Herong's Tutorial Examples
Author: Herong Yang
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 667
Book Description
This book is a collection of tutorial notes and sample codes written by the author while he was learning JVM GC (Garbage Collection) processes. Topics include Java Garbage Collectors, STW (Stop-The-World), Serial Collector, Parallel Collector, Concurrent Collector, G1 Collector, GC Algorithms, Generational GC, Regional GC, Heap Memory Management, Young/New Generation, Tenured/Old Generation, Object Reference, Eden Space, Survivor Spaces, Minor GC, Major GC, Full GC, Performance Tuning, Throughput/Latency Performance, Heap Footprint. Updated in 2024 (Version v1.12) with minor updates. For latest updates and free sample chapters, visit https://www.herongyang.com/Java-GC.
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 667
Book Description
This book is a collection of tutorial notes and sample codes written by the author while he was learning JVM GC (Garbage Collection) processes. Topics include Java Garbage Collectors, STW (Stop-The-World), Serial Collector, Parallel Collector, Concurrent Collector, G1 Collector, GC Algorithms, Generational GC, Regional GC, Heap Memory Management, Young/New Generation, Tenured/Old Generation, Object Reference, Eden Space, Survivor Spaces, Minor GC, Major GC, Full GC, Performance Tuning, Throughput/Latency Performance, Heap Footprint. Updated in 2024 (Version v1.12) with minor updates. For latest updates and free sample chapters, visit https://www.herongyang.com/Java-GC.
Android Tutorials - Herong's Tutorial Examples
Author: Herong Yang
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 346
Book Description
This book is a collection of notes and sample codes written by the author while he was learning Android system. Topics include Installing of Android SDK on Windows, Creating and running Android emulators, Developing First Android Application - HelloAndroid, Creating Android Project with 'android' Command, Building, Installing and Running the Debug Binary Package, Inspecting Android Application Package (APK) Files, Using Android Debug Bridge (adb) Tool, Copying files from and to Android device, Understanding Android File Systems, Using Android Java class libraries, Using 'adb logcat' Command for Debugging. Updated in 2023 (Version v3.05) with ADB tutorials. For latest updates and free sample chapters, visit https://www.herongyang.com/Android.
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 346
Book Description
This book is a collection of notes and sample codes written by the author while he was learning Android system. Topics include Installing of Android SDK on Windows, Creating and running Android emulators, Developing First Android Application - HelloAndroid, Creating Android Project with 'android' Command, Building, Installing and Running the Debug Binary Package, Inspecting Android Application Package (APK) Files, Using Android Debug Bridge (adb) Tool, Copying files from and to Android device, Understanding Android File Systems, Using Android Java class libraries, Using 'adb logcat' Command for Debugging. Updated in 2023 (Version v3.05) with ADB tutorials. For latest updates and free sample chapters, visit https://www.herongyang.com/Android.
MySQL Tutorials - Herong's Tutorial Examples
Author: Herong Yang
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 557
Book Description
This MySQL tutorial book is a collection of notes and sample codes written by the author while he was learning MySQL himself, an ideal tutorial guide for beginners. Topics include introduction of Structured Query Language (SQL); installation of MySQL server on Windows, Linux, and macOS; using MySQL client program; accessing MySQL server from PHP, Java and Perl programs; SQL data types, literals, operations, expressions, and functions; Statements of Data Definition Language (DDL), Data Manipulation Language (DML), and Query Language; creating and using indexes; using window functions; stored procedures; transaction management; locks and deadlocks; InnoDB and other storage engines. Updated in 2023 (Version v4.46) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/MySQL.
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 557
Book Description
This MySQL tutorial book is a collection of notes and sample codes written by the author while he was learning MySQL himself, an ideal tutorial guide for beginners. Topics include introduction of Structured Query Language (SQL); installation of MySQL server on Windows, Linux, and macOS; using MySQL client program; accessing MySQL server from PHP, Java and Perl programs; SQL data types, literals, operations, expressions, and functions; Statements of Data Definition Language (DDL), Data Manipulation Language (DML), and Query Language; creating and using indexes; using window functions; stored procedures; transaction management; locks and deadlocks; InnoDB and other storage engines. Updated in 2023 (Version v4.46) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/MySQL.
Applied Cryptography and Network Security
Author: Kazue Sako
Publisher: Springer Nature
ISBN: 3030783723
Category : Computers
Languages : en
Pages : 487
Book Description
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Publisher: Springer Nature
ISBN: 3030783723
Category : Computers
Languages : en
Pages : 487
Book Description
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Challenges in the IoT and Smart Environments
Author: Reza Montasari
Publisher: Springer Nature
ISBN: 3030871665
Category : Computers
Languages : en
Pages : 322
Book Description
This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients’ lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics. Written by internationally-renowned experts in the field, this book aims to contribute to addressing some of these challenges. Lawyers, psychologists and criminologists could also find this book a very valuable resource at their disposal, and technology enthusiasts might find the book interesting. Furthermore, the book is an excellent advanced text for research and master’s degree students as well as undergraduates at their final years of studies in the stated fields.
Publisher: Springer Nature
ISBN: 3030871665
Category : Computers
Languages : en
Pages : 322
Book Description
This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients’ lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics. Written by internationally-renowned experts in the field, this book aims to contribute to addressing some of these challenges. Lawyers, psychologists and criminologists could also find this book a very valuable resource at their disposal, and technology enthusiasts might find the book interesting. Furthermore, the book is an excellent advanced text for research and master’s degree students as well as undergraduates at their final years of studies in the stated fields.
JDBC Tutorials - Herong's Tutorial Examples
Author: Herong Yang
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 150
Book Description
This JDBC tutorial book is a collection of notes and sample codes written by the author while he was learning JDBC technology himself. Topics include installing JDK and Derby database server; using Derby JDBC driver; database connection URLs; introduction to Result Set; Meta Data, Prepared Statement, CLOB, and BLOB; connection pooling with DBCP and C3P0. Updated in 2024 (Version v3.13) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/JDBC.
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 150
Book Description
This JDBC tutorial book is a collection of notes and sample codes written by the author while he was learning JDBC technology himself. Topics include installing JDK and Derby database server; using Derby JDBC driver; database connection URLs; introduction to Result Set; Meta Data, Prepared Statement, CLOB, and BLOB; connection pooling with DBCP and C3P0. Updated in 2024 (Version v3.13) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/JDBC.
PKI Tutorials - Herong's Tutorial Examples
Author: Herong Yang
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 333
Book Description
This tutorial book is a collection of notes and sample codes written by the author while he was learning PKI (Public Key Infrastructure) technologies himself. Topics include Root CA (Certificate Authorities); SSL, TLS, and HTTPS; Server and client authentication processes; Communication data encryption; Using HTTPS with Chrome, Firefox, Edge, Safari and Internet Explorer; Managing certificates on Windows, macOS, iOS and Android systems; X.509 certificate format; Certificate store and management tools; Certificate validation chain; Self-signed certificate and CSR; Digital signature on MS Word and OpenOffice documents; Get free personal certificate from Comodo. Updated in 2022 (Version v2.31) with macOS and Safari tutorials. For latest updates and free sample chapters, visit https://www.herongyang.com/PKI.
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 333
Book Description
This tutorial book is a collection of notes and sample codes written by the author while he was learning PKI (Public Key Infrastructure) technologies himself. Topics include Root CA (Certificate Authorities); SSL, TLS, and HTTPS; Server and client authentication processes; Communication data encryption; Using HTTPS with Chrome, Firefox, Edge, Safari and Internet Explorer; Managing certificates on Windows, macOS, iOS and Android systems; X.509 certificate format; Certificate store and management tools; Certificate validation chain; Self-signed certificate and CSR; Digital signature on MS Word and OpenOffice documents; Get free personal certificate from Comodo. Updated in 2022 (Version v2.31) with macOS and Safari tutorials. For latest updates and free sample chapters, visit https://www.herongyang.com/PKI.
Unicode Tutorials - Herong's Tutorial Examples
Author: Herong Yang
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 306
Book Description
This Unicode tutorial book is a collection of notes and sample codes written by the author while he was learning Unicode himself. Topics include Character Sets and Encodings; GB2312/GB18030 Character Set and Encodings; JIS X0208 Character Set and Encodings; Unicode Character Set; Basic Multilingual Plane (BMP); Unicode Transformation Formats (UTF); Surrogates and Supplementary Characters; Unicode Character Blocks; Python Support of Unicode Characters; Java Character Set and Encoding; Java Encoding Maps, Counts and Conversion. Updated in 2024 (Version v5.32) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/Unicode.
Publisher: HerongYang.com
ISBN:
Category : Computers
Languages : en
Pages : 306
Book Description
This Unicode tutorial book is a collection of notes and sample codes written by the author while he was learning Unicode himself. Topics include Character Sets and Encodings; GB2312/GB18030 Character Set and Encodings; JIS X0208 Character Set and Encodings; Unicode Character Set; Basic Multilingual Plane (BMP); Unicode Transformation Formats (UTF); Surrogates and Supplementary Characters; Unicode Character Blocks; Python Support of Unicode Characters; Java Character Set and Encoding; Java Encoding Maps, Counts and Conversion. Updated in 2024 (Version v5.32) with minor changes. For latest updates and free sample chapters, visit https://www.herongyang.com/Unicode.