Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Investment Risk Management (The Wiley Finance Series)
Investment Risk Management (The Wiley Finance Series)
Risk has two sides: underestimating it harms the investor, while overestimating it prevents the implementation of bold business projects. This book explains, from the point of view of the practitioner, the analysis of investment risk - a proper account of adequate risk management strategies - and offers an objective and readable account of the most...
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
The relatively recent increase in computational power available for mathematical modeling and simulation raises the possibility that modern numerical methods can play a significant role in the analysis of complex particulate flows. This introductory monograph focuses on basic models and physically based computational solution strategies for the...
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)
Theories of Programming and Formal Methods: Essays Dedicated to Jifeng He on the Occasion of His 70th Birthday (Lecture Notes in Computer Science)

This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

CCNP BSCI Portable Command Guide (Self-Study Guide)
CCNP BSCI Portable Command Guide (Self-Study Guide)

Preparing for the CCNP® certification? Working as a network professional? Here are all the CCNP-level commands for the Building Scalable Cisco Internetworks (BSCI) exam you need in one condensed, portable resource. The CCNP BSCI Portable Command Guide is filled with valuable, easy-to-access information and is portable...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Digital Convergence - Libraries of the Future
Digital Convergence - Libraries of the Future
Clay tablets have been used to keep records from the earliest times. However, they were used for archives rather than libraries and consisted mainly of administrative records.Private and personal libraries containing books first appeared in Greece in the 5th century BC.The Royal Library of Alexandria was founded in the 3rd century BC and was...
Automated Deduction in Geometry: Second International Workshop, ADG'98, Beijing
Automated Deduction in Geometry: Second International Workshop, ADG'98, Beijing
The Second International Workshop on Automated Deduction in Geometry (ADG ’98) was held in Beijing, China, August 1–3, 1998. An increase of interest in ADG ’98 over the previous workshop ADG ’96 is represented by the notable number of more than 40 participants from ten countries and the strong technical...
Knowledge Governance: Processes and Perspectives
Knowledge Governance: Processes and Perspectives
While there are many books on knowledge management, knowledge governance is a concept that has not been so well explored, and is much less understood. Knowledge governance refers to choosing structures and mechanisms that can influence the processes of sharing and creating knowledge.

The book argues that knowledge governance is a
...
Image Processing of Edge and Surface Defects: Theoretical Basis of Adaptive Algorithms with Numerous Practical Applications
Image Processing of Edge and Surface Defects: Theoretical Basis of Adaptive Algorithms with Numerous Practical Applications
The edge and surface inspection is one of the most important and most challenging tasks in quality assessment in industrial production. Typical defects are cracks, inclusions, pores, surface flakings, partial or complete tears of material surface and s.o. These defects can occur through defective source material or through extreme strain during...
The Moral Media: How Journalists Reason About Ethics (Lea's Communication Series)
The Moral Media: How Journalists Reason About Ethics (Lea's Communication Series)
The Moral Media provides readers with preliminary answers to questions about ethical thinking in a professional environment. Representing one of the first publications of journalists' and advertising practitioners' response to the Defining Issues Test (DIT), this book compares thinking about ethics by these two groups with the...
Result Page: 24 23 22 21 20 19 18 17 16 15 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy