Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptography: Cracking Codes (Intelligence and Counterintelligence)

Buy

While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryptionessentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, their real world uses, how codes can be broken, and the use of technology in this oft-overlooked field.

(HTML tags aren't allowed.)

Electric Power Planning for Regulated and Deregulated Markets
Electric Power Planning for Regulated and Deregulated Markets

As the industry environment transforms from a completely regulated setting to a broader, deregulated marketplace, new market participants must understand planning and operations of power systems to effectively participate in markets.  This industry overview provides a description of utility operations and traditional planning, and then...

Ruby on Rails: Up and Running
Ruby on Rails: Up and Running
Ruby on Rails is the super-productive new way to develop full-featured web applications. With Ruby on Rails, powerful web applications that once took weeks or months to develop can now be produced in a matter of days. If it sounds too good to be true, it isn't.

If you're like a lot of web developers, you've probably considered kicking the...

Understanding Context: Environment, Language, and Information Architecture
Understanding Context: Environment, Language, and Information Architecture
To make sense of the world, we're always trying to place things in context, whether our environment is physical, cultural, or something else altogether. Now that we live among digital, always-networked products, apps, and places, context is more complicated than ever--starting with "where" and "who" we are.
...

Advanced Web Technologies and Applications
Advanced Web Technologies and Applications
This book constitutes the refereed proceedings of the 6th Asia-Pacific Web Conference, APWeb 2004, held in Hangzhou, China, in April 2004.

The 60 revised full papers, 24 revised short papers, 15 revised poster papers, and 3 revised industrial papers presented together with 3 keynote papers and 3 invited papers were carefully reviewed and...

Apple Pro Training Series : Logic Pro 7 and Logic Express 7
Apple Pro Training Series : Logic Pro 7 and Logic Express 7
With a new plug-in that re-creates the sounds of 11 of the world's best-known guitar amps, distributed audio processing (which lets you tap into a virtually unlimited number of Macs), new software instruments (including a killer drum machine), and a slew of workflow enhancements, it's no wonder you're chomping at the bit to start using Logic Pro 7...
Web Security & Commerce (O'Reilly Nutshell)
Web Security & Commerce (O'Reilly Nutshell)
Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of
personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about?

Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy