Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, FC 2007, and the co-located 1st International Workshop on Usable Security, USEC 2007, both held in Scarborough, Trinidad/Tobago, in February 2007.

The book includes 17 revised full papers, 1 system...

Identity and Data Security for Web Development: Best Practices
Identity and Data Security for Web Development: Best Practices

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...

Coding for Data and Computer Communications
Coding for Data and Computer Communications
Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding can prevent a serious and practical understanding of this important area. "Coding for Data and Computer Communications" eschews the complex mathematics and clearly describes the...
Advanced BlackBerry Development
Advanced BlackBerry Development

BlackBerry devices and applications are selling by the millions. As a BlackBerry developer, you need an advanced skill set to successfully exploit the most compelling features of the platform. This book will help you develop that skill set and teach you how to create the most sophisticated BlackBerry programs possible.

With Advanced...

Security on Rails
Security on Rails

The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it...

Quantum Optics (Oxford Graduate Texts)
Quantum Optics (Oxford Graduate Texts)
Quantum optics, i.e. the interaction of individual photons with matter, began with the discoveries of Planck and Einstein, but in recent years, it has expanded beyond pure physics to become an important driving force for technological innovation. This book serves the broader readership growing out of this development by starting with an elementary...
Algebraic Curves in Cryptography (Discrete Mathematics and Its Applications)
Algebraic Curves in Cryptography (Discrete Mathematics and Its Applications)

The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic...

Formal Correctness of Security Protocols (Information Security and Cryptography)
Formal Correctness of Security Protocols (Information Security and Cryptography)
Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.

The author investigates proofs of correctness of realistic security protocols in...

Node.js Recipes: A Problem-Solution Approach
Node.js Recipes: A Problem-Solution Approach

Node.js Recipes is your one-stop reference for solving Node.js problems. Filled with useful recipes that follow a problem/solution format, you can look up recipes for many situations that you may come across in your day-to-day server-side development. 

Node.js is accessible to those who not only relish...

Pairing-Based Cryptography  Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Lecture Notes in Computer Science)
Pairing-Based Cryptography Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Lecture Notes in Computer Science)
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.

The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents...

Information Assurance: Security in the Information Environment (Computer Communications and Networks)
Information Assurance: Security in the Information Environment (Computer Communications and Networks)
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare,...
Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory

This book is based on a course in cryptography at the upper level under graduate and beginning graduate level that has been given at the University of Maryland since 1997. When designing the course, we decided on the fol lowing requirements.

• The course should be up-to-date and cover a broad selection of topics from a...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy