Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)
Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition (Discrete Mathematics and Its Applications)

Using mathematical tools from number theory and finite fields, Applied Algebra: Codes, Ciphers, and Discrete Algorithms, Second Edition presents practical methods for solving problems in data security and data integrity. It is designed for an applied algebra course for students who have had prior classes in abstract or linear...

Visual Basic 2005 Cookbook: Solutions for VB 2005 Programmers (Cookbooks)
Visual Basic 2005 Cookbook: Solutions for VB 2005 Programmers (Cookbooks)

This book will help you solve more than 300 of the most common and not-so-common tasks that working Visual Basic 2005 programmers face every day. If you're a seasoned .NET developer, beginning Visual Basic programmer, or a developer seeking a simple and clear migration path from VB6 to Visual Basic 2005, the ...

Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Embedded Security in Cars: Securing Current and Future Automotive IT Applications
Most innovations in the car industry are based on software and electronics, and IT will soon constitute the major production cost factor. It seems almost certain that embedded IT security will be crucial for the next generation of applications. Yet whereas software safety has become a relatively well-established field, the protection of automotive...
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography

Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history...

Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and Cryptography (SIGMA Series in Pure Mathematics)
Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and Cryptography (SIGMA Series in Pure Mathematics)

A new approach to conveying abstract algebra, the area that studies algebraic structures, such as groups, rings, fields, modules, vector spaces, and algebras, that is essential to various scientific disciplines such as particle physics and cryptology. It provides a well written account of the theoretical foundations; also contains topics that...

Blockchain Basics: A Non-Technical Introduction in 25 Steps
Blockchain Basics: A Non-Technical Introduction in 25 Steps

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.

This book...

Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
The 6th Conference on Security and Cryptography for Networks (SCN 2008) was held in Amalfi, Italy, on September 10–12, 2008. The first four editions of the conference where held in Amalfi, while, two years ago, the fifth edition was held in the nearby Maiori. This year we moved back to the traditional location.

Security and privacy
...
Basics of Contemporary Cryptography for IT Practitioners
Basics of Contemporary Cryptography for IT Practitioners
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques...
CISSP : Certified Information Systems Security Professional Study Guide, Third Edition
CISSP : Certified Information Systems Security Professional Study Guide, Third Edition
CISSP Certified Information Systems Security Professional Study Guide

Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological...

Security+ Study Guide
Security+ Study Guide
Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study Guides

The Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test
...
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Lecture Notes in Computer Science)
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Lecture Notes in Computer Science)

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of...

Algorithmic Game Theory
Algorithmic Game Theory
In the last few years game theory has had a substantial impact on computer science, especially on Internet- and e-commerce-related issues. More than 40 of the top researchers in this field have written chapters that go from the foundations to the state of the art. Basic chapters on algorithmic methods for equilibria, mechanism design and...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy