Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

Think Data Structures: Algorithms and Information Retrieval in Java
Think Data Structures: Algorithms and Information Retrieval in Java

If you’re a student studying computer science or a software developer preparing for technical interviews, this practical book will help you learn and review some of the most important ideas in software engineering—data structures and algorithms—in a way that’s clearer, more concise, and more engaging than...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this...

Advanced Topics in Java: Core Concepts in Data Structures
Advanced Topics in Java: Core Concepts in Data Structures

Java is one of the most widely used programming languages today. It was first released by Sun Microsystems in 1995. Over the years, its popularity has grown to the point where it plays an important role in most of our lives. From laptops to data centers, game consoles to scientific supercomputers, cell phones to the Internet, Java is...

Data Structures and Algorithms Using C#
Data Structures and Algorithms Using C#
C# programmers: no more translating data structures from C++ or Java to use in your programs! Mike McMillan provides a tutorial on how to use data structures and algorithms plus the first comprehensive reference for C# implementation of data structures and algorithms found in the .NET Framework library, as well as those developed by the...
Microsoft Enterprise Library 5.0
Microsoft Enterprise Library 5.0

Microsoft Enterprise Library is a collection of reusable software components (also known as Application Blocks) that are designed to assist developers with common enterprise development challenges. Before using an Application block, you should have a good understanding of your application requirements and of the scenarios that the Application...

Ruby Pocket Reference
Ruby Pocket Reference

Updated for Ruby 2.2, this handy reference offers brief yet clear explanations of Ruby’s core elements—from operators to blocks to documentation creation—and highlights the key features you may work with every day. Need to know the correct syntax for a conditional? Forgot the name of that String method? This book is...

Beginning Visual Basic 2005 Databases (Programmer to Programmer)
Beginning Visual Basic 2005 Databases (Programmer to Programmer)

As one of the most popular programming languages in the world, Visual Basic continues to expand on the functionality and flexibility of its framework. This book explains how to use Visual Basic 2005 to write efficient database applications that can be used throughout an enterprise.

With this teaching tool, you'll learn how to...

Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
The 6th Conference on Security and Cryptography for Networks (SCN 2008) was held in Amalfi, Italy, on September 10–12, 2008. The first four editions of the conference where held in Amalfi, while, two years ago, the fifth edition was held in the nearby Maiori. This year we moved back to the traditional location.

Security and privacy
...
Advances in Crytology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security
Advances in Crytology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security

This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009.

The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in...

Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources  of end users, the...

Data Structures for Game Programmers (Premier Press Game Development)
Data Structures for Game Programmers (Premier Press Game Development)
"Data Structures for Game Programmers" replaces endless pages of boring text with exciting gaming technology and eye-catching graphics. The complex subject of data structures is made easy to understand and fun to learn. Start with an explanation of how the most popular data structures and algorithms work. Then you're on your way as you...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy