Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C++ for Mathematicians: An Introduction for Students and Professionals
C++ for Mathematicians: An Introduction for Students and Professionals

The first book available on C++ programming that is written specifically for a mathematical audience, C++ for Mathematicians omits the language's more obscure features in favor of the aspects of greatest utility for mathematical work. Emphasizing the essential role of practice as part of the learning process, the book is ideally designed...

Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Cryptanalysis
Cryptanalysis
Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve — with solutions....
Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory provides a tutorial on the basic of network coding theory. It presents the material in a transparent manner without unnecessarily presenting all the results in their full generality. Store-and-forward had been the predominant technique for transmitting information through a network until its optimality was refuted by network...
Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Classical and Quantum Information Theory: An Introduction for the Telecom Scientist
Information theory lies at the heart of modern technology, underpinning all communications, networking, and data storage systems. This book sets out, for the first time, a complete overview of both classical and quantum information theory. Throughout, the reader is introduced to key results without becoming lost in mathematical details. Opening...
Codes and Cryptography
Codes and Cryptography

This text unifies the concepts of information, codes and cryptography as first studied by Shannon in his seminal papers on communication and secrecy systems. The first five chapters cover the fundamental ideas of information theory, compact encoding of messages and the theory of error-correcting codes. After a discussion of mathematical...

Wi-Foo : The Secrets of Wireless Hacking
Wi-Foo : The Secrets of Wireless Hacking

The definitive guide to penetrating and defending wireless networks.

Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any...

Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011

The 13th IMA Conference on Cryptography and Coding was held at the Lady Margaret Hall, University of Oxford, UK, during December 12–15, 2011. This event was a 25th anniversary celebration of the very successful biennial IMA conference series. Traditionally, the conference has taken place at the Royal Agricultural College,...

Guide to Elliptic Curve Cryptography (Springer Professional Computing)
Guide to Elliptic Curve Cryptography (Springer Professional Computing)
The study of elliptic curves by algebraists, algebraic geometers and number theorists
dates back to the middle of the nineteenth century. There now exists an extensive literature
that describes the beautiful and elegant properties of these marvelous objects. In
1984, Hendrik Lenstra described an ingenious algorithm for factoring
...
Semantic Techniques in Quantum Computation
Semantic Techniques in Quantum Computation

The idea of quantum computation, in the algorithmic sense, originated from the suggestion by Feynman (1982) that a computer based on the principles of quantum mechanics might be capable of efficiently simulating quantum systems of interest to physicists; such simulation seems to be very difficult with classical computers. Feynman’s...

Quantum Computing Explained
Quantum Computing Explained
“In the twenty-first” century it is reasonable to expect that some of the most important developments in science and engineering will come about through interdisciplinary research. Already in the making is surely one of the most interesting and exciting development we are sure to see for a long time, quantum computation.

A
...
Security+ Study Guide
Security+ Study Guide

Here’s the book you need to prepare for CompTIA’s Security+ Exam, SYO-101. This study guide provides:

  • Full coverage of every exam objective
  • Practical information on network hardware
  • Hundreds of challenging practice questions

Authoritative coverage of all exam...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy