45,26 €
50,29 €
-10% with code: EXTRA
Spot-On Encryption Suite
Spot-On Encryption Suite
45,26
50,29 €
  • We will send in 10–14 business days.
Spot-On Encryption Suite is a secure instant chat messenger and encrypting e-mail client that also includes additional features such as group chat, file transfer, and a URL search based on an implemented URL data-base, which can be peer-to-peer connected to other nodes. Also, further tools for file encryption or text conversion to ciphertext etc. are included. The Spot-On program might currently be regarded as a very elaborated, up-to-date and diversificated open source encryption software for…
  • Publisher:
  • Year: 2019
  • Pages: 304
  • ISBN-10: 3749435065
  • ISBN-13: 9783749435067
  • Format: 14.8 x 21 x 1.6 cm, softcover
  • Language: English
  • SAVE -10% with code: EXTRA

Spot-On Encryption Suite (e-book) (used book) | bookbook.eu

Reviews

Description

Spot-On Encryption Suite is a secure instant chat messenger and encrypting e-mail client that also includes additional features such as group chat, file transfer, and a URL search based on an implemented URL data-base, which can be peer-to-peer connected to other nodes. Also, further tools for file encryption or text conversion to ciphertext etc. are included. The Spot-On program might currently be regarded as a very elaborated, up-to-date and diversificated open source encryption software for Multi-Encryption and Cryptographic Calling: As it also includes the McEliece algorithm it is thus described as the first McEliece Encryption Suite worldwide - to be especially secure against attacks known from Quantum Computing. Thus, the three basic functions frequently used by a regular Internet user in the Internet - communication (chat / e-mail), web search and file transfer - are now secure over the Internet within one software suite: Open source for everyone. This handbook and user manual of Spot-On is a practical software guide with introductions not only to this application and its innovative and invented processes, but also into Encryption, Cryptography, Cryptographic Calling and Cryptographic Discovery, Graph-Theory, p2p Networking, NTRU, McEliece, the Echo Protocol and the Democratization of Multiple and Exponential Encryption also in the regard of the context of Privacy and Human Rights. The book covers more than 15 chapters and more than 80 figures with content for presentations within educational tutorials or for self-learning opportunities about these topics.

EXTRA 10 % discount with code: EXTRA

45,26
50,29 €
We will send in 10–14 business days.

The promotion ends in 18d.04:45:17

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,50 Book Euros!?
  • Author: Scott Edwards
  • Publisher:
  • Year: 2019
  • Pages: 304
  • ISBN-10: 3749435065
  • ISBN-13: 9783749435067
  • Format: 14.8 x 21 x 1.6 cm, softcover
  • Language: English English

Spot-On Encryption Suite is a secure instant chat messenger and encrypting e-mail client that also includes additional features such as group chat, file transfer, and a URL search based on an implemented URL data-base, which can be peer-to-peer connected to other nodes. Also, further tools for file encryption or text conversion to ciphertext etc. are included. The Spot-On program might currently be regarded as a very elaborated, up-to-date and diversificated open source encryption software for Multi-Encryption and Cryptographic Calling: As it also includes the McEliece algorithm it is thus described as the first McEliece Encryption Suite worldwide - to be especially secure against attacks known from Quantum Computing. Thus, the three basic functions frequently used by a regular Internet user in the Internet - communication (chat / e-mail), web search and file transfer - are now secure over the Internet within one software suite: Open source for everyone. This handbook and user manual of Spot-On is a practical software guide with introductions not only to this application and its innovative and invented processes, but also into Encryption, Cryptography, Cryptographic Calling and Cryptographic Discovery, Graph-Theory, p2p Networking, NTRU, McEliece, the Echo Protocol and the Democratization of Multiple and Exponential Encryption also in the regard of the context of Privacy and Human Rights. The book covers more than 15 chapters and more than 80 figures with content for presentations within educational tutorials or for self-learning opportunities about these topics.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)