|
|
|
|
|
|
Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... | | | | |
|
Desktop Encyclopedia of Voice and Data in Networking
The telecommunications industry is changing rapidly in its quest to converge voice and data on high-performance multiservice networks that are designed to meet virtually any business and consumer need. These nextgeneration networks are being driven as much by the revenue-generating potential of new integrated applications as they are by the... | | Exploring iPad For Dummies
Get to know the incredible iPad in a uniquely different Dummies format!
The iPad combines the best of your favorite gadgets into one amazing ultraportable touch device. And, thisone-of-a-kind For Dummies guide is your is your ticket for making the most out of your iPad or iPad 2. Thoroughly updated for the... | | Prions: Food and Drug Safety
Prion diseases recently have attracted interest not only scientifically but also socially because of the bovine spongiform encephalopathy (BSE) epidemic and the outbreak of variant Creutzfeldt-Jakob disease (vCJD) in the United Kingdom. In 2004, the International Symposium of Prion Diseases for Food and Drug Safety was held October... |
|
|
Result Page: 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 |