 |
|
 Cryptography: An IntroductionNigel Smart’s Cryptography provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics. Covering the latest developments in computer cryptography, including the Rijndael algorithm chosen for the... |  |  ZigBee Wireless Networks and TransceiversZigBee is a short-range wireless networking standard backed by such industry leaders as Motorola, Texas Instruments, Philips, Samsung, Siemens, Freescale, etc. It supports mesh networking, each node can transmit and receive data, offers high security and robustness, and is being rapidly adopted in industrial, control/monitoring, and medical... |  |  CompTIA Network+ All-in-One Exam Guide, Fourth EditionAll-in-One is All You Need
Get complete coverage of all the material included on the latest release of the CompTIA Network+ exam inside this fully updated, comprehensive resource. Written by CompTIA certification and training expert Mike Meyers, this authoritative exam guide features learning objectives at the beginning of each... |
|
 Codes and Ciphers: Julius Caesar, the Enigma, and the Internet"He has written an excellent book that belongs in your personal library." Cryptologia
"Churchhouse (emer., Cardiff Univ., Wales) offers a history and explanation of codes, ciphers, cryptography, and cryptanalysis from Julius Caesar and WWII code-breaking activities to the present day including the world of the Internet.... |  |  The Cryptoclub: Using Mathematics to Make and Break Secret CodesJoin the Cryptokids as they apply basic mathematics to make and break secret codes. This book has many hands-on activities that have been tested in both classrooms and informal settings. Classic coding methods are discussed, such as Caesar, substitution, Vigenère, and multiplicative ciphers as well as the modern RSA. Math topics covered... |  |  Beautiful Security: Leading Security Experts Explain How They ThinkIn this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found... |
|
|
 Random Curves: Journeys of a MathematicianThese autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital signature, cover many topics besides his own personal career in mathematics and cryptography - travels to the Soviet Union, Latin America, Vietnam and elsewhere, political activism, and academic controversies relating to math... |  |  Mastering SQL Server 2008As Microsoft’s bestselling database manager, SQL Server is highly flexible and customizable, and has excellent support—the 2008 version offers several significant new capabilities. This book offers accurate and expert coverage on the updates to SQL Server 2008 such as its enhanced security; the ability to encrypt an entire database,... |  |  Information ScienceFrom cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains... |
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 |