|
|
|
|
|
|
Basics of Contemporary Cryptography for IT PractitionersThe aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques... | | | | |
|
Networking All-in-One Desk Reference For Dummies (Computer/Tech)Covers all Windows® XP service packs and Fedora Linux®
Your one-stop guide to building and managing a business or home network
Why take up a whole shelf with networking books when all the essentials are right here in one handy volume? Here's how to put a network together, choose the hardware and software, set up a server,... | | Craniofacial Identification
The promotion of CCTV surveillance and identity cards, along with ever heightened security at airports, immigration control and institutional access, has seen a dramatic increase in the use of automated and manual recognition. In addition, several recent disasters have highlighted the problems and challenges associated with current disaster... | | Cut and Fold Techniques for Pop-Up Designs
Introducing techniques for making pop-ups from one sheet of card, the third title in this series on paper engineering takes folding techniques into the third dimension.
Each chapter introduces a new technical idea and show how that technique can be adapted in many different ways, or combined with techniques from earlier... |
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |