Works through 35 cryptography modules supported by exercises and answers
This first part comprises thirteen modules. These modules will
familiarize you with some of the important terms and concepts of
cryptography in general and symmetric of one-key cryptography in specific.
Symmetric cryptography is the...
Fork Algebras in Algebra, Logic and Computer Science
Fork algebras are a formalism based on the relational calculus, with interesting algebraic and metalogical properties. Their representability is especially appealing in computer science, since it allows a closer relationship between their language and models. This book gives a careful account of the results and presents some applications of...
Genetic Fuzzy Systems
In recent years, a great number of publications have explored the use of genetic algorithms as a tool for designing fuzzy systems. Genetic Fuzzy Systems explores and discusses this symbiosis of evolutionary computation and fuzzy logic. The book summarizes and analyzes the novel field of genetic fuzzy systems, paying special attention to...
Workflow Management: Models, Methods, and Systems (Cooperative Information Systems) This book offers a comprehensive introduction to workflow management, the management of business processes with information technology. By defining, analyzing, and redesigning an organization's resources and operations, workflow management systems ensure that the right information reaches the right person or computer application at the right time.... Security Technologies for the World Wide Web, Second Edition
This newly revised edition of the Artech House bestseller offers the most up-to-date comprehensive analysis of the current trends in WWW security available, with brand new chapters on authentication and authorization infrastructures, server-side security, and risk management. Practitioners will also find coverage of entirely new topics such as...
Virtual Machine Design and Implementation in C/C++ (With CD-ROM) This guide provides an in-depth look at the construction and underlying theory of a fully functional virtual machine and an entire suite of related development tools.
With the emergence of multiplatform production systems and network-centric computing, the software industry has witnessed the resurgence of the virtual machine. Rather than...
|Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next |