Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
Optimizing C ++
Optimizing C ++
Written in an exceptionally clear style that doesn't skimp on technical detail, Steve Heller's guide offers several high-performance search and data-compression algorithms, which are all you need to add speed to C++. Early sections of the book address the advantages of optimizing C++, which the author considers something of a lost art. Instead of...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)
Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)

Evidenced by the success of Facebook, Twitter, and LinkedIn, online social networks (OSNs) have become ubiquitous, offering novel ways for people to access information and communicate with each other. As the increasing popularity of social networking is undeniable, scalability is an important issue for any OSN that wants to serve a large...

Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Database Management Systems
Database Management Systems
DATABASE MANAGEMENT SYSTEMS is designed for use in a course in databases. This book is distinctive in its emphasis on the practical side of databases. This means that it has unique coverage of database design, uses SQL throughout the book to demonstrate different concepts, and has an emphasis on query evaluation and optimization. In this revision...
The Joys of Hashing: Hash Table Programming with C
The Joys of Hashing: Hash Table Programming with C
Build working implementations of hash tables, written in the C programming language. This book starts with simple first attempts devoid of collision resolution strategies, and moves through improvements and extensions illustrating different design ideas and approaches, followed by experiments to validate the choices. 
...
Advanced Data Structures
Advanced Data Structures
Advanced Data Structures presents a comprehensive look at the ideas, analysis, and implementation details of data structures as a specialized topic in applied algorithms. Data structures are how data is stored within a computer, and how one can go about searching for data within. This text examines efficient ways to search and update sets of...
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner
Beginning Java Data Structures and Algorithms: Sharpen your problem solving skills by learning core computer science concepts in a pain-free manner

Though your application serves its purpose, it might not be a high performer. Learn techniques to accurately predict code efficiency, easily dismiss inefficient solutions, and improve the performance of your application.

Key Features

  • Explains in detail different algorithms and data...
Beyond Buds: Marijuana Extracts—Hash, Vaping, Dabbing, Edibles and Medicines
Beyond Buds: Marijuana Extracts—Hash, Vaping, Dabbing, Edibles and Medicines
Beyond Buds is a handbook to the future of marijuana. Prohibition’s end has led to a technological revolution that’s generated powerful medicines and products containing almost zero carcinogens and little smoke. Marijuana icon Ed Rosenthal and leading cannabis reporter David Downs guide readers through the best new...
Result Page: 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy