Home | Amazing | Today | Tags | Publishers | Years | Search 
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)

The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world’s most important block cipher. In...

Deploying .NET Applications: Learning MSBuild and ClickOnce (Expert's Voice in .Net)
Deploying .NET Applications: Learning MSBuild and ClickOnce (Expert's Voice in .Net)

Whether building a console application, a web service, or a smart client, you eventually need to distribute your finished work. Deploying .NET Applications is a complete guide to delivering applications built with .NET. Packed with hands-on guidance, practical examples, and war stories from the authors' many experiences with deployment...

Haskell: The Craft of Functional Programming (2nd Edition)
Haskell: The Craft of Functional Programming (2nd Edition)
The second edition of Haskell: The Craft of Functional Programming is essential reading for beginners to functional programming and newcomers to the Haskell programming language. The emphasis is on the process of crafting programs and the text contains many examples and running case studies, as well as advice an program design, testing, problem...
BizTalk 2006 Recipes: A Problem-Solution Approach
BizTalk 2006 Recipes: A Problem-Solution Approach

BizTalk 2006 Recipes: A Problem-Solution Approach is based on the experiences of many of the most prominent experts in the field. It features over 170 problem-solving recipes for BizTalk developers and administrators.

BizTalk Server 2006 builds on the heritage and core architecture of BizTalk Server 2004, leading to a powerful...

An Introduction to Optimization, 2nd Edition
An Introduction to Optimization, 2nd Edition
A modern, up-to-date introduction to optimization theory and methods
This authoritative book serves as an introductory text to optimization at the senior undergraduate and beginning graduate levels. With consistently accessible and elementary treatment of all topics, An Introduction to Optimization, Second Edition helps students build a
...
Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
VEE Pro: Practical Graphical Programming
VEE Pro: Practical Graphical Programming
With VEE 7.0 Trial Version on CD-ROM From the depths of the oceans to the deserts of Mars, VEE Pro is being used to collect data, provide automated testing and to construct remote command and telemetry interfaces. In more everyday environments, it can be found at the heart of manufacturing, process and quality control, and industrial data analysis...
Broadband Packet Switching Technologies: A Practical Guide to ATM Switches and IP Routers
Broadband Packet Switching Technologies: A Practical Guide to ATM Switches and IP Routers
The effective design of high-speed, reliable switching systems is essential for moving the huge volumes of traffic and multimedia over modern communications networks. This book explains all the main packet-switching architectures, including all theoretical and practical topics relevant to the design and management of high-speed networks. Delivering...
Security in Computing (4th Edition)
Security in Computing (4th Edition)
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information...

Data Warehousing and Data Mining for Telecommunications (Artech House Computer Science Library)
Data Warehousing and Data Mining for Telecommunications (Artech House Computer Science Library)
Provides practical, step-by-step instructions on how to design and develop effective, costefficient data warehouses. DLC: Telecommunications Management.

Through dozens of case studies and real-world examples, this clearly written guide shows telecommunications managers how to build more effective data warehouses without wasting time and
...
Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing begins with the introduction of multimedia information applications, the need for the development of the multimedia database management systems (MDBMSs), and the important issues and challenges of multimedia systems. The temporal relations, the spatial relations, the spatio-temporal...
Metro Ethernet
Metro Ethernet

The definitive guide to enterprise and carrier metro Ethernet applications

  • Easy to read and understand, following the style of the best-selling Internet Routing Architectures
  • Understand emerging metro Ethernet services such as point-to-point packet-leased line services and multipoint-to-multipoint VPLS
  • ...
Result Page: 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy