• Samsung SSD 860 EVO 1TB 2.5 Inch SATA III Internal SSD (MZ-76E1T0B/AM)

    :The SSD you trust: The newest edition to the world's best selling SATA SSD series, the Samsung 860 EVO is specially designed to enhance performance of mainstream PCs and laptops. With the latest V NAND technology, this fast and reliable SSD comes in a wide range of compatible form factors and capacities. Enhanced performance: Speeds are consistent, even under heavy workloads and multi tasking allowing for faster file transfer. The 860 EVO performs at sequential read speeds up to 550 MB/s with Intelligent TurboWrite technology, and sequential write speeds up to 520 MB/s. The TurboWrite buffer ... [Read More]

    • ASIN: B078DPCY3T
    • UPC: 887276232294
    • ASIN: B078DPCY3T
    • Brand: Samsung
    • Size: 1 TB
    • Manufacturer: Samsung Electronics DAV

  • International Data Encryption Algorithm Toolkit: best-practice templates, step-by-step work plans and maturity diagnostics

    The Toolkit contains the following practical and powerful enablers with new and updated International Data Encryption Algorithm specific requirements:Step 1 get your bearings resources: The quick edition of the International Data Encryption Algorithm Self Assessment book in PDF containing 49 requirements to perform a quickscan, get an overview and share with stakeholders, plus an example pre-filled Self-Assessment Excel Dashboard to get familiar with results generation. Step 2 set concrete goals resources: Featuring 670 new and updated case-based questions, organized into seven core areas of p... [Read More]

    • ASIN: B07B7DY58D
    • UPC: 012868267358
    • ASIN: B07B7DY58D
    • Brand: The Art of Service
    • Manufacturer: The Art of Service

  • Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery (The Morgan Kaufmann Series in Data Management Systems)

    Transactional Information Systems is the long-awaited, comprehensive work from leading scientists in the transaction processing field. Weikum and Vossen begin with a broad look at the role of transactional technology in today's economic and scientific endeavors, then delve into critical issues faced by all practitioners, presenting today's most effective techniques for controlling concurrent access by multiple clients, recovering from system failures, and coordinating distributed transactions. The authors emphasize formal models that are easily applied across fields, that promise to remain val... [Read More]

    • ASIN: 1558605088
    • ASIN: 1558605088
    • ISBN: 1558605088
    • Manufacturer: Morgan Kaufmann

  • Mastering Algorithms with C: Useful Techniques from Sorting to Encryption


    • ASIN: 1565924533
    • UPC: 636920924531
    • ASIN: 1565924533
    • ISBN: 1565924533
    • Manufacturer: O'Reilly Media

  • Encrypted Data Security USB Device, Dataram QBKEY Fingerprint Password Manager USB-C Encryption Key and SSH Agent for Windows

    ⦁Safely secure any type of data, anywhere, anytime without storage limitations. ⦁A device-to-device file sharing solution. Support IPFS - INTERPLANETARY FILE SYSTEM. ⦁Password Management without account registration. ⦁Full Drive Encryption for local drives or external drives.Add/remove other QBKEY users to/from their encrypted drives. ⦁SSH Key management. Scan your finger to load your SSH keys. As easy as that. ⦁Plausible Deniability & Coerced Finger Scanning Protection. ⦁Biometric Authentication ⦁Mitigates Phishing and MitM Attacks ⦁Autonomous and independent ⦁Produced... [Read More]

    • ASIN: B07FFVTWGC
    • UPC: 767523445175
    • ASIN: B07FFVTWGC
    • Brand: Dataram
    • Manufacturer: Dataram

  • Hacking: The Art of Exploitation, 2nd Edition

    Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacke... [Read More]

    • ASIN: B004OEJN3I
    • ASIN: B004OEJN3I
    • Manufacturer: No Starch Press

  • Applied Cryptography: Protocols, Algorithms and Source Code in C

    From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then s... [Read More]

    • ASIN: 1119096723
    • ASIN: 1119096723
    • ISBN: 1119096723
    • Brand: imusti
    • Manufacturer: Wiley

  • The Design of RijndaeL: AES - The Advanced Encryption Standard (Information Security and Cryptography)

    An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with imple... [Read More]

    • ASIN: 3540425802
    • ASIN: 3540425802
    • ISBN: 3540425802
    • Brand: Brand: Springer
    • Manufacturer: Springer

  • The Twofish Encryption Algorithm: A 128-Bit Block Cipher

    The first and only guide to one of today's most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at: * A... [Read More]

    • ASIN: 0471353817
    • ASIN: 0471353817
    • ISBN: 0471353817
    • Manufacturer: Wiley

  • Apricorn Aegis Padlock 2 TB USB 3.0 256-Bit AES XTS Hardware Encrypted Portable External Hard Drive (A25-3PL256-2000)

    Apricorn's Aegis Padlock 3.0 is a state of the art hardware encrypted USB 3.0 portable drive. Simple and easy to use, Padlock 3.0 offers unparalleled security and supports AES XTS 256-bit encryption. Additionally, the software free design means it can be deployed without the need for Admin User rights and will work with any USB enable operating system. Completely cross compatible, the Padlock 3.0 is authenticated via the integrated keypad and can support up to 5 User PINs and an Admin PIN. The Aegis Padlock 3.0 ships with Padlock 3.0 drive with integrated USB 3.0 cable, USB 3.0 Y-extension cab... [Read More]

    • ASIN: B00NTQGZP6
    • UPC: 785528613405
    • ASIN: B00NTQGZP6
    • Brand: Apricorn
    • Size: 2 TB
    • Manufacturer: APRICORN MASS STORAGE

  • Haicam IP Camera End-to-End Encryption Home Security Surveillance Monitor with 2 Way Audio/Motion Sound Detection/Amazon/Apple/Google TV Apps - Cloud Service E23

    Haicam is an Australian brand, our service team looks forward to helping you from set-up to troubleshooting. Reach us by APP, official website, Amazon email, etc. (Email: [email protected]) End-to-end Encryption Haicam protects videos with end-to-end encryption technology. No one else, including our software engineers, have the ability to view the video stream and the recording file Instant Access To Time-lapse Swipe the video history time line up and down to see the video history time-lapse. 60 seconds, 30 seconds and 10 seconds time-lapse playing in the mobile app automatically. C... [Read More]

    • ASIN: B078WYYF4H
    • ASIN: B078WYYF4H
    • Brand: HAICAM
    • Manufacturer: Absolute Mobile Pty. Ltd.

  • Skydigital EZSAVE LOCKDOCK Docking Station Data Password Security USB3 Docking 2.53.5 SATA HDD Equipped with AES 256bit encryption Algorithm(No Hard)

    Product details HDD : SATA I/II/III - 3.5" and 2.5" HDD/SSD HDD Safety Remove : Mount/Un-mount feature Menu : Password change/Security, normal mode select Master Key : Emergency data rescue by Master-key Interface : USB 3.0 Super Speed (Max 5Gbps) USB3.0 Max speed is available when it's connected with USB3.0 host device) Compatible with USB 2.0 OS : All Operation Systems recognizing USB storage device. Product specifications Size/Weight : (W) 121 x (H) 76 x (D) 116mm / 185g(w/o HDD) Origin : Made in Korea Special Feature : Audio Sound Support(Menu) Manufacturer : Skydigital Inc

    • ASIN: B07P4CXSM1
    • UPC: 191997012128
    • ASIN: B07P4CXSM1
    • Brand: [SkydigitalOEM]
    • Size: (W) 121 x (H) 76 x (D) 116mm
    • Manufacturer: [SkydigitalOEM]

  • Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)

    Advances in hardware technology have increased the capability to store and record personal data. This has caused concerns that personal data may be abused. This book proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. This edited volume contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions of a particular topic in privacy. The book is designed for researchers, professors, and advanced-level students in computer science, but is also suitable for practitione... [Read More]

    • ASIN: 0387709916
    • ASIN: 0387709916
    • ISBN: 0387709916
    • Manufacturer: Springer

  • Understanding Cryptography: A Textbook for Students and Practitioners


    • ASIN: B014P9I39Q
    • ASIN: B014P9I39Q
    • Manufacturer: Springer

  • Selected Works III: Information Theory and the Theory of Algorithms (Mathematics and its Applications)

    The creative work of Andrei N. Kolmogorov is exceptionally wide-ranging. In his studies on trigonometric and orthogonal series, the theory of measure and inte­gral, mathematical logic, approximation theory, geometry, topology, functional analysis, classical mechanics, ergodic theory, superposition of functions, and in­ formation theory, he solved many conceptual and fundamental problems and posed new questions which gave rise to a great deal of further research. Kolmogorov is one of the founders of the Soviet school of probability theory, mathematical statistics, and the theory of turbulence... [Read More]

    • ASIN: 9027727988
    • ASIN: 9027727988
    • ISBN: 9027727988
    • Brand: Brand: Springer
    • Manufacturer: Springer

  • What to Do When Machines Do Everything : How to Get Ahead in a World of Ai, Algorithms, Bots, and Big Data

    Refreshingly thought-provoking

    • UPC: 55133390

  • Data Structures and Algorithms Made Easy in Java : Data Structure and Algorithmic Puzzles, Second Edition

    Video Link: youtube.com/watch?v=l_GRquIrVyg A handy guide of sorts for any computer science professional, Data Structures And Algorithms Made Easy in Java: Data Structure And Algorithmic Puzzles is a solution bank for various complex problems related

    • UPC: 53666017

  • Computer Age Statistical Inference : Algorithms, Evidence, and Data Science

    Take an exhilarating journey through the modern revolution in statistics with two of the

    • UPC: 52565402

  • Data Structures and Algorithms in Java

    Data Structures and Algorithms in Java 6/E International Student

    • UPC: 55598323
    • Rating: 4.0

  • Think Data Structures : Algorithms and Information Retrieval in Java

    If you're a student studying computer science or a software developer preparing for technical interviews, this practical book will help you learn and review some of the most important ideas in software engineering--data structures and

    • UPC: 56021008

  • Data Structures and Algorithms Made Easy : Data Structures and Algorithmic Puzzles

    "Data Structures And Algorithms Made Easy: Data Structures and Algorithmic Puzzles" is a book that offers solutions to complex data structures and algorithms. There are multiple solutions for each problem and the book is coded

    • UPC: 910566270

  • Poweradd 32GB USB 3.0 Flash Drives With Data Encryption Function

    High-speed USB 3.0 technology, both reading speed and writing speed can reach 200 M/s. It is much faster than traditional 3.0 USB memory. It has a "virus check function" that can detect and quarantine virus

    • UPC: 464604223
    • Color: Gray

  • A Common-Sense Guide to Data Structures and Algorithms : Level Up Your Core Programming Skills

    "A practical approach to data structures and algorithms, with techniques and real-world scenarios that you can use in your daily production code. Graphics and examples make these computer science concepts understandable and relevant. You can

    • UPC: 56073115

  • Algorithms Illuminated (Part 2) : Graph Algorithms and Data Structures

    Algorithms are the heart and soul of computer science. Their applications range from network routing and computational genomics to public-key cryptography and machine learning. Studying algorithms can make you a better programmer, a clearer thinker,

    • UPC: 984751668

  • Problem Solving with Algorithms and Data Structures Using Python

    THIS TEXTBOOK is about computer science. It is also about Python. However, there is much more. The study of algorithms and data structures is central to understanding what computer science is all about. Learning computer

    • UPC: 32734550

  • Public Key Cryptography: RSA Encryption Algorithm

    How secure is 256 bit security?

    Hashing Algorithms and Security - Computerphile