Home | Amazing | Today | Tags | Publishers | Years | Search 
The Arithmetic of Elliptic Curves (Graduate Texts in Mathematics)
The Arithmetic of Elliptic Curves (Graduate Texts in Mathematics)

The theory of elliptic curves is distinguished by its long history and by the diversity of the methods that have been used in its study. This book treats the arithmetic theory of elliptic curves in its modern formulation, through the use of basic algebraic number theory and algebraic geometry. The book begins with a brief discussion of the...

Security on Rails
Security on Rails

The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it...

The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009
Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale...

Mobile Application Security
Mobile Application Security

Secure today's mobile devices and applications

Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest...

Arithmetic Optimization Techniques for Hardware and Software Design
Arithmetic Optimization Techniques for Hardware and Software Design

Obtain better system performance, lower energy consumption, and avoid hand-coding arithmetic functions with this concise guide to automated optimization techniques for hardware and software design. High-level compiler optimizations and high-speed architectures for implementing FIR filters are covered, which can improve performance in...

Cavity Quantum Electrodynamics: The Strange Theory of Light in a Box
Cavity Quantum Electrodynamics: The Strange Theory of Light in a Box

What happens to light when it is trapped in a box?

Cavity Quantum Electrodynamics addresses a fascinating question in physics: what happens to light, and in particular to its interaction with matter, when it is trapped inside a box? With the aid of a model-building approach, readers discover the answer to this question and come to...

Developer's Guide to Microsoft Enterprise Library, C# Edition
Developer's Guide to Microsoft Enterprise Library, C# Edition

Welcome to the era of software reuse! Microsoft Enterprise Library helps accelerate development by providing reusable components and guidance on proven practices. If you build applications that run on the Microsoft .NET Framework, whether they are enterprise-level business applications or even relatively modest Windows® Forms,...

Wireless Network Administration A Beginner's Guide
Wireless Network Administration A Beginner's Guide

Learn the essentials of wireless networking

Configure, manage, and secure wireless networks using the step-by-step details in this practical resource. Wireless Network Administration: A Beginner's Guide shows you how to work with the latest wireless networking standards, including the 802.11x family, on Windows, Mac,...

Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook

Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand....

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Digital Media Processing: DSP Algorithms Using C
Digital Media Processing: DSP Algorithms Using C

Multimedia processing demands efficient programming in order to optimize functionality. Data, image, audio, and video processing, some or all of which are present in all electronic devices today, are complex programming environments. Optimized algorithms (step-by-step directions) are difficult to create but can make all the difference when...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy