Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Brute Force: Cracking the Data Encryption Standard
Brute Force: Cracking the Data Encryption Standard
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved...
UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Professional DotNetNuke Module Programming
Professional DotNetNuke Module Programming
Professional DotNetNuke® Module Programming

As the force behind the creation of new functionality to DotNetNuke Web sites, DotNetNuke modules are reusable programming components that offer a way to extend the basic DotNetNuke framework. With this resource, you'll learn the best practices for DotNetNuke module development, and you'll gain a...

Bayesian Argumentation: The practical side of probability (Synthese Library)
Bayesian Argumentation: The practical side of probability (Synthese Library)

Relevant to, and drawing from, a range of disciplines, the chapters in this collection show the diversity, and applicability, of research in Bayesian argumentation. Together, they form a challenge to philosophers versed in both the use and criticism of Bayesian models who have largely overlooked their potential in argumentation. Selected from...

Sams Teach Yourself DirectX 7 in 24 Hours (Teach Yourself -- Hours)
Sams Teach Yourself DirectX 7 in 24 Hours (Teach Yourself -- Hours)
From the first hour, Sams Teach Yourself DirectX 7 in 24 Hours has you creating your own DirectX-enabled applications. Author Robert Dunlop guides you through the complicated DirectX APIs, empowering you to create your own DirectX powered applications featuring smooth 3D graphics and sound. In addition to laying the COM-based DirectX foundation,...
Design of Ultra Wideband Antenna Matching Networks: Via Simplified Real Frequency Technique (Signals and Communication Technology)
Design of Ultra Wideband Antenna Matching Networks: Via Simplified Real Frequency Technique (Signals and Communication Technology)
Design of Ultra Wideband Antenna Matching Networks: via Simplified Real Frequency Technique (SRFT) will open up a new horizon for design engineers, researchers, undergraduate and graduate students to construct multi-band and ultra wideband antenna matching networks for antennas which in turn will push the edge of technology to manufacture...
Adobe Dreamweaver CS5 with PHP: Training from the Source
Adobe Dreamweaver CS5 with PHP: Training from the Source
My first encounter with PHP came about 10 years ago. By that time, I already had plenty of experience developing websites. I had started out writing HTML in a text editor before settling on Dreamweaver as my favorite authoring tool. A new project involved publishing more than 30 articles a day. It was a subscription service, so the...
Quantitative Remote Sensing in Thermal Infrared: Theory and Applications (Springer Remote Sensing/Photogrammetry)
Quantitative Remote Sensing in Thermal Infrared: Theory and Applications (Springer Remote Sensing/Photogrammetry)
Remote sensing, by definition, is the acquisition of information about objects or events without making physical contact. In the broad usage, remote sensing refers to the use of both the force fields (such as gravity and magnetism) and electromagnetic spectrum to detect, classify, and identify the objects or events. In the...
Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed...
Forensic Computer Crime Investigation
Forensic Computer Crime Investigation
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest...
Managing Internetworks With Snmp
Managing Internetworks With Snmp
Managing Internetworks with SNMP, Second Edition, is an invaluable guide for all network managers and administrators who maintain a complex internetwork. This comprehensive reference provides a technical understanding and practical application of SNMP, the protocol developed by the Internet community to simplify the management of...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy