Introduction
NaCl advances the state of the art by improving security, by improving usability, ... NaCl is part of the CACE (Computer Aided Cryptography Engineering) ...
http://nacl.cace-project.eu/
popularity:
security
cryptography
crypto
library
programming
encryption
software
network
free
opensource
|
A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
|
JavaScrypt: Browser-Based Cryptography Tools
No information avaiable
similarity:
popularity:
javascript
cryptography
security
encryption
crypto
web
tools
programming
code
aes
|
jBCrypt - strong password hashing for Java
No information avaiable
similarity:
popularity:
java
security
password
encryption
cryptography
programming
library
opensource
bcrypt
hashing
|
Rainbow table - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
security
cryptography
wikipedia
cracking
hash
rainbow
passwords
crypto
password
encryption
|
Security Engineering - A Guide to Building Dependable Distributed Systems
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
|
HMAC - Wikipedia, the free encyclopedia
As with any MAC, it may be used to simultaneously verify both the ... Retrieved from "http://en.wikipedia.org/wiki/HMAC" Categories: Message authentication ...
similarity:
popularity:
security
hmac
hash
crypto
algorithms
authentication
encryption
cryptography
programming
wikipedia
|
Snort - the de facto standard for intrusion detection/prevention
Download for Snort, an open source network intrusion prevention and detection ... Click the rules button for more information on the rulesets available on Snort.org ...
similarity:
popularity:
security
network
opensource
software
linux
tools
ids
snort
networking
sysadmin
|
Nessus
Free, open-source vulnerability and remote security scanner.
similarity:
popularity:
security
network
software
tools
scanner
linux
opensource
networking
vulnerability
sysadmin
|
OWASP - Home
Developing software tools and knowledge based documentation that helps people secure web applications and web services.
similarity:
popularity:
security
web
programming
opensource
development
webdev
reference
software
application
internet
|
NIST.gov - Computer Security Division - Computer Security Resource Center
No information avaiable
similarity:
popularity:
security
cryptography
encryption
nist
crypto
toolkit
standards
computer
algorithms
specification
|