Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning JavaScript Data Structures and Algorithms: Write complex and powerful JavaScript code using the latest ECMAScript, 3rd Edition
Learning JavaScript Data Structures and Algorithms: Write complex and powerful JavaScript code using the latest ECMAScript, 3rd Edition

Create classic data structures and algorithms such as depth-first search and breadth-first search, learn recursion, as well as create and use a heap data structure using JavaScript

Key Features

  • Implement common data structures and the associated algorithms along with the context in which...
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required...
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Learn to evaluate and compare data encryption methods and attack cryptographic systems

Key Features

  • Explore popular and important cryptographic methods
  • Compare cryptographic modes and understand their limitations
  • Learn to perform attacks on cryptographic...
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity
Ethereum Smart Contract Development: Build blockchain-based decentralized applications using solidity

Become an Ethereum Blockchain developer using a blend of concepts and hands-on implementations

Key Features

  • Understand the Ethereum Ecosystem and its differences from its rich cousin Bitcoin
  • Explore the Solidity programming language and smart contract optimizations
  • ...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Ruby Pocket Reference
Ruby Pocket Reference
Although Ruby is an easy language to learn, in the heat of action you may find that you can't remember the correct syntax for a conditional or the name of a method. This handy pocket reference offers brief yet clear explanations of Ruby's core components, from operators to reserved words to data structures to method syntax, highlighting those key...
Java SE8 for the Really Impatient: A Short Course on the Basics (Java Series)
Java SE8 for the Really Impatient: A Short Course on the Basics (Java Series)

Eagerly anticipated by millions of programmers, Java SE 8 is the most important Java update in many years. The addition of lambda expressions (closures) and streams represents the biggest change to Java programming since the introduction of generics and annotations.

 

...
Beginning Lua Programming (Programmer to Programmer)
Beginning Lua Programming (Programmer to Programmer)
If so, you’ll find this versatile and fast programming language called Lua to be the perfect tool. Lua has a gentle learning curve that will enable you to write effective programs after only a short introduction. With it, simple programs look simple—there is no extraneous baggage you need to add to your programs or peculiar syntax to...
Sas 9.2 Language Reference Dictionary
Sas 9.2 Language Reference Dictionary
In a DATA step, you can track the execution of code within a DO group. The DATA statement has an optional argument for you to write a note to the SAS log when the DO statement begins and ends.

 New SAS system options enable you to set a default record length, specify options for accessing PDF files, specify values for Scalable
...
Extending MFC Applications with the .NET Framework
Extending MFC Applications with the .NET Framework

Extending MFC Applications with the .NET Framework is the first book to show MFC developers how to boost productivity by incorporating .NET functionality into existing MFC applications. Tom Archer clearly illustrates how using the .NET Base Class Library (BCL)—to complement or replace MFC classes when there is a...

Advanced Topics in C: Core Concepts in Data Structures
Advanced Topics in C: Core Concepts in Data Structures

C is the most widely used programming language of all time. It has been used to create almost every category of software imaginable and the list keeps growing every day. Cutting-edge applications, such as Arduino, embeddable and wearable computing are ready-made for C.  

Advanced Topics In
...

unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy