Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Encryption for Digital Content (Advances in Information Security)
Encryption for Digital Content (Advances in Information Security)

Encryption for Digital Content is an area in cryptography that is widely used in commercial productions (e.g., Blu-Ray and HD-DVDs). This book provides a comprehensive mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. A complete description of...

Developing Secure Applications with Visual Basic
Developing Secure Applications with Visual Basic

Using client-proven methods, and over 15 years of programming experience, expert author Davis Chapman empowers developers to create powerful, secure applications. Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own...

Privacy Preserving Data Mining (Advances in Information Security)
Privacy Preserving Data Mining (Advances in Information Security)
Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would...
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for...

Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the...
Microsoft ASP.NET Setup and Configuration Pocket Reference
Microsoft ASP.NET Setup and Configuration Pocket Reference
This hands-on, one-stop guide delivers the focused, streamlined direction you need to get your Web solutions up and running quickly. Zero in on key ASP.NET configuration details and techniques using quick-reference tables, lists, coding and more.

This pocket-sized reference is the Web application developer’s fast-answers guide to...

Mathematical Foundations of Computer Science 2008: 33rd International Symposium, MFCS 2008, Torun, Poland, August 25-29, 2008, Proceedings
Mathematical Foundations of Computer Science 2008: 33rd International Symposium, MFCS 2008, Torun, Poland, August 25-29, 2008, Proceedings
This book constitutes the refereed proceedings of the 33rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2008, held in Torun, Poland, in August 2008.

The 45 revised full papers presented together with 5 invited lectures were carefully reviewed and selected from 119 submissions. All current aspects in theoretical...

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

Modern Python Standard Library Cookbook: Over 100 recipes to fully leverage the features of the standard library in Python
Modern Python Standard Library Cookbook: Over 100 recipes to fully leverage the features of the standard library in Python

Build optimized applications in Python by smartly implementing the standard library

Key Features

  • Strategic recipes for effective application development in Python
  • Techniques to create GUIs and implement security through cryptography
  • Best practices for...
Digital Media Processing: DSP Algorithms Using C
Digital Media Processing: DSP Algorithms Using C

Multimedia processing demands efficient programming in order to optimize functionality. Data, image, audio, and video processing, some or all of which are present in all electronic devices today, are complex programming environments. Optimized algorithms (step-by-step directions) are difficult to create but can make all the difference when...

Algorithms and Computation: 20th International Symposium, ISAAC 2009, Honolulu, Hawaii
Algorithms and Computation: 20th International Symposium, ISAAC 2009, Honolulu, Hawaii

The papers in this volume were presented at the 20th Annual International Symposium on Algorithms and Computation, held December 16–18, 2009, in Hawaii, USA. In response to the Call-for-Papers, 279 papers were submitted. Each paper received at least three reviews by either Program Committee members or experts selected by Program...

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy