|
|
|
|
C++ for Mathematicians: An Introduction for Students and Professionals
The first book available on C++ programming that is written specifically for a mathematical audience, C++ for Mathematicians omits the language's more obscure features in favor of the aspects of greatest utility for mathematical work. Emphasizing the essential role of practice as part of the learning process, the book is ideally designed... | | | | CryptanalysisThorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve — with solutions.... |
|
|
Wi-Foo : The Secrets of Wireless Hacking The definitive guide to penetrating and defending wireless networks.
Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any... | | Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011
The 13th IMA Conference on Cryptography and Coding was held at the Lady
Margaret Hall, University of Oxford, UK, during December 12–15, 2011. This
event was a 25th anniversary celebration of the very successful biennial IMA
conference series. Traditionally, the conference has taken place at the Royal
Agricultural College,... | | Guide to Elliptic Curve Cryptography (Springer Professional Computing)The study of elliptic curves by algebraists, algebraic geometers and number theorists dates back to the middle of the nineteenth century. There now exists an extensive literature that describes the beautiful and elegant properties of these marvelous objects. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring... |
|
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |