



Fundamentals of Cryptology: A Professional Reference and Interactive TutorialThe protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....     Cryptography and Public Key Infrastructure on the InternetCryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:
* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation, ... 

104 Number Theory Problems: From the Training of the USA IMO TeamThis challenging problem book by renowned US Olympiad coaches, mathematics teachers, and researchers develops a multitude of problemsolving skills needed to excel in mathematical contests and research in number theory. Offering inspiration and intellectual delight, the problems throughout the book encourage students to express their ideas,...   Topics in Mathematical Analysis (Series on Analysis, Applications and Computation)This volume consists of a series of lecture notes on mathematical analysis. The contributors have been selected on the basis of both their outstanding scientific level and their clarity of exposition. Thus, the present collection is particularly suited to young researchers and graduate students. Through this volume, the editors intend to provide...   




Result Page: 4 3 2 1 