Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linear Algebra and Probability for Computer Science Applications
Linear Algebra and Probability for Computer Science Applications

Based on the author’s course at NYU, Linear Algebra and Probability for Computer Science Applications gives an introduction to two mathematical fields that are fundamental in many areas of computer science. The course and the text are addressed to students with a very weak mathematical background. Most of the...

Numerical Computing with MATLAB
Numerical Computing with MATLAB
This is a lively textbook for an introductory course in numerical methods, MATLAB, and technical computing, which emphasises the informed use of mathematical software. Numerical Computing with MATLAB helps readers learn about the mathematical functions in MATLAB, how to appreciate their limitations, and how to use and modify them appropriately....
Applied Cryptanalysis: Breaking Ciphers in the Real World
Applied Cryptanalysis: Breaking Ciphers in the Real World
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material...
Applications of Algebra to Communications, Control, and Signal Processing (SpringerBriefs in Computer Science)
Applications of Algebra to Communications, Control, and Signal Processing (SpringerBriefs in Computer Science)

Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in the fields of error-control codes and cryptography. More recently, broader applications have emerged, requiring quite sophisticated algebra - for example, the Alamouti scheme in MIMO...

Algorithms and Theory of Computation Handbook (Chapman & Hall/CRC Applied Algorithms and Data Structures series)
Algorithms and Theory of Computation Handbook (Chapman & Hall/CRC Applied Algorithms and Data Structures series)
This comprehensive compendium of algorithms and data structures covers many theoretical issues from a practical perspective. Chapters include information on finite precision issues as well as discussions on specific algorithms where algorithmic techniques are of special importance - for example, algorithms for drawing graphs, algorithms for...
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
The vast expansion and rigorous treatment of cryptography is one of the major achievements of theoretical computer science. In particular, concepts such as computational indistinguishability, pseudorandomness and zero-knowledge interactive proofs were introduced, classical notions such as secure encryption and unforgeable signatures were placed on...
Computer Security and Cryptography
Computer Security and Cryptography

Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect...

Wireless Security and Cryptography: Specifications and Implementations
Wireless Security and Cryptography: Specifications and Implementations
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which...
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies...

JAVA 2 Network Security (2nd Edition)
JAVA 2 Network Security (2nd Edition)

The complete insider's guide to securing Java 2 enterprise applications!

  • Building secure enterprise applications with Java 2!
  • Integrating Java 2 into your overall security strategy
  • Detailed coverage for managers, developers, netadmins, and security specialists
  • ...
Mac Application Development For Dummies
Mac Application Development For Dummies

The App Store extends to the Mac desktop! Developers: here's how join the fun

If you love your desktop Mac and want to enjoy the fun and challenge of developing Mac apps for the App Store, here's your chance to get started. This fun, full-color guide shows you how to create killer Mac apps on, and for, a desktop Mac....

Modern Cryptography: Protect Your Data with Fast Block Ciphers
Modern Cryptography: Protect Your Data with Fast Block Ciphers
This book gives a general picture of modern cryptography. At the same time, it covers specific issues related to developing fast block ciphers using software and/or hardware implementation in a way that is easily understandable to a wide circle of readers. The material dedicated to the meaning of cryptography in informational society, two-key...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy