 |
|
|
 Practical Signcryption (Information Security and Cryptography)
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives... |  |  Compiler Design: Virtual Machines
While compilers for high-level programming languages are large complex software systems, they have particular characteristics that differentiate them from other software systems. Their functionality is almost completely well-defined – ideally there exist complete precise descriptions of the source and target languages, while additional... |  |  Moodle 2.0 First Look
The book looks at the main functional areas of Moodle that have significant new features, explains the new features and how to use them. It draws attention to significant differences from how things used to behave, and gives the reader an idea of the kind of consequences these changes will bring to them. If you are an existing Moodle user,... |
|
 Security and Privacy in Mobile Information and Communication Systems
MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats... |  |  C# in Depth, Second Edition
C# has changed significantly since it was first introduced. With the many upgraded features, C# is more expressive than ever. However, an in depth understanding is required to get the most out of the language.
C# in Depth, Second Edition is a thoroughly revised, up-to-date book that covers the new features of C# 4... |  |  Electrons and Phonons: The Theory of Transport Phenomena in Solids
LIKE a chemical compound, scientific knowledge is purified by recrystallization. When first published, each new grain of fact or theory shines from a mud of irrelevant or erroneous details. In subsequent discussion the grains are redissolved, and filtered. Finally, in books and treatises, the solution is allowed to precipitate into a single... |
|
|
Result Page: 850 849 848 847 846 845 844 843 842 841 840 839 838 837 836 835 834 833 832 |