Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Probability: With Applications and R
Probability: With Applications and R

An introduction to probability at the undergraduate level

Chance and randomness are encountered on a daily basis. Authored by a highly qualified professor in the field, Probability: With Applications and R delves into the theories and applications essential to obtaining a thorough understanding of probability.

...
Computational Complexity: A Conceptual Perspective
Computational Complexity: A Conceptual Perspective
This book offers a comprehensive perspective to modern topics in complexity theory, which is a central field of the theoretical foundations of computer science. It addresses the looming question of what can be achieved within a limited amount of time with or without other limited natural computational resources. Can be used as an introduction for...
Decrypted Secrets: Methods and Maxims of Cryptology
Decrypted Secrets: Methods and Maxims of Cryptology
"The best single book on cryptology today." --Cryptologia (from a review of a previous edition)

"It is an outstanding book that assumes only elementary mathematical knowledge and is interspersed with many exciting, amusing, and sometimes personal stories from the history of cryptology."
...
A Classical Introduction to Cryptography Exercise Book
A Classical Introduction to Cryptography Exercise Book
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the authors and given as examinations to advanced-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical...
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian...
Critical Reflections on Information Systems: A Systemic Approach
Critical Reflections on Information Systems: A Systemic Approach
While implementing IS and IT in support of their business strategies, companies are looking for ways to bridge the gap between their competitive position and technological investment, including ways to use this investment to the advantage of the organization. Critical Reflections on Information Systems: A Systemic Approach faces this challenge by...
Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Result Page: 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy