

|  | 
				NaCl advances the state of the art by improving security, by improving usability, ... NaCl is part of the CACE (Computer Aided Cryptography Engineering) ...			 
				
					http://nacl.cace-project.eu/				
							 
						popularity:
						 
							security						 
							cryptography						 
							crypto						 
							library						 
							programming						 
							encryption						 
							software						 
							network						 
							free						 
							opensource						 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								security							 
								cryptography							 
								java							 
								timing							 
								programming							 
								hacking							 
								attack							 
								crypto							 
								statistics							 
								python							 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								javascript							 
								cryptography							 
								security							 
								encryption							 
								crypto							 
								web							 
								tools							 
								programming							 
								code							 
								aes							 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								java							 
								security							 
								password							 
								encryption							 
								cryptography							 
								programming							 
								library							 
								opensource							 
								bcrypt							 
								hashing							 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								security							 
								cryptography							 
								wikipedia							 
								cracking							 
								hash							 
								rainbow							 
								passwords							 
								crypto							 
								password							 
								encryption							 | 
|  | 
					Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...				 
							similarity:
							 
							popularity:
							 
								security							 
								book							 
								books							 
								reference							 
								engineering							 
								network							 
								computer							 
								free							 
								programming							 
								ebook							 | 
|  | 
					As with any MAC, it may be used to simultaneously verify both the ... Retrieved from "http://en.wikipedia.org/wiki/HMAC" Categories: Message authentication ...				 
							similarity:
							 
							popularity:
							 
								security							 
								hmac							 
								hash							 
								crypto							 
								algorithms							 
								authentication							 
								encryption							 
								cryptography							 
								programming							 
								wikipedia							 | 
|  | 
					Download for Snort, an open source network intrusion prevention and detection ... Click the rules button for more information on the rulesets available on Snort.org ...				 
							similarity:
							 
							popularity:
							 
								security							 
								network							 
								opensource							 
								software							 
								linux							 
								tools							 
								ids							 
								snort							 
								networking							 
								sysadmin							 | 
|  | 
					Free, open-source vulnerability and remote security scanner.				 
							similarity:
							 
							popularity:
							 
								security							 
								network							 
								software							 
								tools							 
								scanner							 
								linux							 
								opensource							 
								networking							 
								vulnerability							 
								sysadmin							 | 
|  | 
					Developing software tools and knowledge based documentation that helps people secure web applications and web services.				 
							similarity:
							 
							popularity:
							 
								security							 
								web							 
								programming							 
								opensource							 
								development							 
								webdev							 
								reference							 
								software							 
								application							 
								internet							 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								security							 
								cryptography							 
								encryption							 
								nist							 
								crypto							 
								toolkit							 
								standards							 
								computer							 
								algorithms							 
								specification							 | 
 an example search result
			an example search result