Home | Amazing | Today | Tags | Publishers | Years | Search 
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier

"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,...

Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
"He has written an excellent book that belongs in your personal library." Cryptologia

"Churchhouse (emer., Cardiff Univ., Wales) offers a history and explanation of codes, ciphers, cryptography, and cryptanalysis from Julius Caesar and WWII code-breaking activities to the present day including the world of the Internet.
...
Liabilities, Liquidity, and Cash Management: Balancing Financial Risks
Liabilities, Liquidity, and Cash Management: Balancing Financial Risks
"This book provides a very helpful and informative insight into an aspect of finance that has become quite intricate and complex but is nevertheless very fascinating."--Dr. Henry Kaufman, President, Henry Kaufman & Company, Inc.

Strategies and advice on balancing financial risk for leveraged companies

In...

Databases A Beginner's Guide
Databases A Beginner's Guide

Thirty-five years ago, databases were found only in special research laboratories, where computer scientists struggled with ways to make them efficient and useful, publishing their findings in countless research papers. Today databases are a ubiquitous part of the information technology (IT) industry and business in general. We directly and...

Linux Recipes for Oracle DBAs (Recipes: a Problem-Solution Approach)
Linux Recipes for Oracle DBAs (Recipes: a Problem-Solution Approach)

Linux Recipes for Oracle DBAs is an example–based book on managing Oracle Database in a Linux environment. Covering commonly used distributions such as Red Hat Enterprise Linux and Oracle Enterprise Linux, the book is written for database administrators who need to get work done and lack the luxury of curling up fireside with a...

The Price of Prosperity: A Realistic Appraisal of the Future of Our National Economy (Peter L. Bernstein's Finance Classics)
The Price of Prosperity: A Realistic Appraisal of the Future of Our National Economy (Peter L. Bernstein's Finance Classics)
One of the foremost financial writers of his generation, Peter Bernstein has the unique ability to synthesize intellectual history and economics with the theory and practice of investment management. Now, with classic titles such as Economist on Wall Street, A Primer on Money, Banking, and Gold, and The Price of Prosperitywhich have...
Vault Guide to Finance Interviews, 6th Edition
Vault Guide to Finance Interviews, 6th Edition
Money makes the world go round, and those in charge of money are the financiers. Have thirst for relevance? The finance industry has always been a competitive field, due in large part to the glamour and prestige assigned to the working relationships with industry titans. Of course, the outstanding salaries explain much of the pull as well. (Unless...
Spring Persistence with Hibernate
Spring Persistence with Hibernate

Spring is the leading platform to build and run enterprise Java applications. Spring's Hibernate integration makes it easy to mix and match persistence methodologies simplifying your Hibernate applications. You can incorporate lots of Inversion of Control (IoC) convenience features to address many typical Hibernate integration issues,...

Graphs and Algorithms in Communication Networks: Studies in Broadband, Optical, Wireless and Ad Hoc Networks
Graphs and Algorithms in Communication Networks: Studies in Broadband, Optical, Wireless and Ad Hoc Networks

Algorithmic discrete mathematics plays a key role in the development of information and communication technologies, and methods that arise in computer science, mathematics and operations research – in particular in algorithms, computational complexity, distributed computing and optimization – are vital to modern services such as...

The Meltdown Years: The Unfolding of the Global Economic Crisis
The Meltdown Years: The Unfolding of the Global Economic Crisis

The Meltdown Years offers the most lucid and useful explanation to date about why home values, life savings, job security, and investments around the world are in peril.

Rather than focus on who is to blame, though, author Wolfgang Münchau takes the more practical approach of focusing on...

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the...

Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy