Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Codes: An Introduction to Information Communication and Cryptography (Springer Undergraduate Mathematics Series)
Codes: An Introduction to Information Communication and Cryptography (Springer Undergraduate Mathematics Series)
Many people do not realise that mathematics provides the foundation for the devices we use to handle information in the modern world. Most of those who do know probably think that the parts of mathematics involved are quite ‘classical’, such as Fourier analysis and differential equations. In fact, a great deal of...
Android Programming: Pushing the Limits
Android Programming: Pushing the Limits

Unleash the power of the Android OS and build the kinds ofbrilliant, innovative apps users love to use

If you already know your way around the Android OS and can builda simple Android app in under an hour, this book is for you. Ifyou’re itching to see just how far you can push it anddiscover what Android is really...

Network Programming with Rust: Build fast and resilient network servers and clients by leveraging Rust's memory-safety and concurrency features
Network Programming with Rust: Build fast and resilient network servers and clients by leveraging Rust's memory-safety and concurrency features
Learn to write servers and network clients using Rust
Key Features
  • Build a solid foundation in Rust while also mastering important network programming details
  • Leverage the power of a number of available libraries to perform network operations in Rust
  • Develop a fully...
Progress on Cryptography: 25 Years of Cryptography in China
Progress on Cryptography: 25 Years of Cryptography in China
This workshop entitled “Progress on Cryptography: 25 Year of Cryptography in China” is being held during the celebration of Professor Guozhen Xiao’s 70th birthday. This proceeding is a birthday gift from all of his current and former graduate students, who have had the pleasure of being supervised by Professor Xiao during the last...
Learn Python Programming: The no-nonsense, beginner's guide to programming, data science, and web development with Python 3.7, 2nd Edition
Learn Python Programming: The no-nonsense, beginner's guide to programming, data science, and web development with Python 3.7, 2nd Edition

Learn the fundamentals of Python (3.7) and how to apply it to data science, programming, and web development. Fully updated to include hands-on tutorials and projects.

Key Features

  • Learn the fundamentals of Python programming with interactive projects
  • Apply Python to data...
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
QUANTUM COMPUTING WITH PYTHON: The new comprehensive guide to master applied artificial intelligence in Physics. Learn Machine Learning and computer programming with a complete crash course
QUANTUM COMPUTING WITH PYTHON: The new comprehensive guide to master applied artificial intelligence in Physics. Learn Machine Learning and computer programming with a complete crash course

*KINDLE VERSION Discounted at $ 9.99 instead of $ 14.99... Get QUANTUM PHYSICS section for FREE!!

"Master the best methods for PYTHON. Learn how to programming as a pro and get positive ROI in 7 days with data science and machine learning" 

Are you looking...

CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Elementary Number Theory in Nine Chapters
Elementary Number Theory in Nine Chapters

This book is intended to serve as a one-semester introductory course in number theory. Throughout the book a historical perspective has been adopted and emphasis is given to some of the subject's applied aspects; in particular the field of cryptography is highlighted. At the heart of the book are the major number theoretic accomplishments...

Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy