Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Cryptography
Introduction to Cryptography

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on...

Encyclopedia of World Cultures: Russia and Eurasia/China
Encyclopedia of World Cultures: Russia and Eurasia/China
This project began in 1987 with the goal of assembling a basic reference source that provides accurate, clear, and concise descriptions of the cultures of the world. We wanted to be as comprehensive and authoritative as possible: comprehensive, by providing descriptions of all the cultures of each region of the world or by describing a...
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
How to Buy a House with No (or Little) Money Down, 3rd Edition
How to Buy a House with No (or Little) Money Down, 3rd Edition
The Ultimate guide to finding and financing a home

Almost everyone aspires to owning a home, but the reality of coming up with a large enough down payment often stands in the way of making that dream come true. No longer! How to Buy a House with No (or Little) Money Down has helped tens of thousands become homeowners, and now it's your turn!...

Improving Profit: Using Contribution Metrics to Boost the Bottom Line
Improving Profit: Using Contribution Metrics to Boost the Bottom Line

Business of all sizes have a problem: How do you know—in real time—whether you are earning the profit you need to grow or even just stay in business? And which products or services are doing the “heavy lifting” in contributing to profit? Financial statements tell only part of the story. They are backward looking, for...

Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

Appreneur: Secrets to Success in the App Store
Appreneur: Secrets to Success in the App Store

You are interested in making an app. You have read all of the stories of successful developers and appreneurs. You are determined to get a piece of the pie. The world of apps is the fastest growing market in the world today, and it is here to stay. The best part is you can get in on it! Now what if I told you that without the knowledge...

Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Business Analysis: Microsoft Excel 2010 (MrExcel Library)
Business Analysis: Microsoft Excel 2010 (MrExcel Library)

USE EXCEL 2010 TO GAIN DEEPER INSIGHTS, MAKE SMARTER DECISIONS, AND EARN MORE PROFITS

 

Using real-world examples, Carlberg helps you put Excel’s features and functions to work and get the power of quantitative analysis behind your management...

Project Management Simulation with PTB Project Team Builder
Project Management Simulation with PTB Project Team Builder

“The Project Team Builder (PTB) meets the need for an effective teaching and training tool of project management. The software introduces the user to the full dynamics of project planning, monitoring and control, moving scenario-wise from the easy, fundamental issues to the more involved, complex ones. Based on a sound conceptual...

Information Science
Information Science
From cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy