Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
    Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic...
Web.Studies: Rewiring Media Studies for the Digital Age
Web.Studies: Rewiring Media Studies for the Digital Age
'Web.Studies sets the agenda for a new period of media research, one that gets to grips with the significance of new communications technologies and the global spaces in which they are so rapidly developing. I believe that this book will help considerably to take media studies in new directions.' - Professor Kevin Robins, Goldsmiths College,...
New Dimensions in Photo Processes: A Step by Step Manual, Third Edition
New Dimensions in Photo Processes: A Step by Step Manual, Third Edition
The writing of this book was undertaken almost by accident. While I was freelancing as an illustrator, I showed my portfolio of photo images to Lista Duren, an editor at Curtin & London Publishing Company. Ms. Duren brought the portfolio to Dennis Curtin, who, on the spot, asked me to write a book about the techniques represented. Curtin &...
The Government Machine: A Revolutionary History of the Computer
The Government Machine: A Revolutionary History of the Computer
Sitting in the reading rooms of the Public Record Office in London, a historian is in the center of a museum of organization. Copies of the catalogue to the museum fill several walls (although these are now complemented by online versions). The catalogue lists are dominated by references to objects of one kind: the file. The file has in its...
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Discover True North : A Program to Ignite Your Passion and Activate Your Potential
Discover True North : A Program to Ignite Your Passion and Activate Your Potential
A powerful formula for a life of achievement--starting now

Created by leading motivational speaker and corporate trainer Anne Bruce, this highly effective plan helps participants discover their own "true north" in order to find a focus for success. Throughout Discover True North are invaluable exercises,...

Basic Statistics Using SAS Enterprise Guide: A Primer
Basic Statistics Using SAS Enterprise Guide: A Primer

Now it's easy to perform many of the most common statistical techniques when you use the SAS Enterprise Guide point-and-click interface to access the power of SAS. Emphasizing the practical aspects of the analysis, this example-rich guide shows you how to conduct a wide range of statistical analyses without any SAS programming required. One or...

Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis

As a programmer working for Logica UK in London in the mid-1980’s, I became a passionate advocate of formal methods. Extrapolating from small successes with VDM and JSP, I was sure that widespread use of formal methods would bring an end to the software crisis.

One approach especially intrigued me. John Guttag and Jim
...

Geometric Spanner Networks
Geometric Spanner Networks
Aimed at an audience of researchers and graduate students in computational geometry and algorithm design, this book uses the Geometric Spanner Network Problem to showcase a number of useful algorithmic techniques, data structure strategies, and geometric analysis techniques with many applications, practical and theoretical. The authors present...
Making Musical Apps: Real-time audio synthesis on Android and iOS
Making Musical Apps: Real-time audio synthesis on Android and iOS
Pure Data (Pd) is a programming language for digital audio and more. Written by Miller Puckette in the 1990s and under active development ever since, Pd has established itself as one of the leading open-source packages for computer music, and it remains largely interoperable with its commercial cousin, Max/MSP. A Pd program,...
Magic Is Dead: My Journey into the World's Most Secretive Society of Magicians
Magic Is Dead: My Journey into the World's Most Secretive Society of Magicians

In the vein of Neil Strauss’ The Game and Joshua Foer’s Moonwalking with Einstein comes the fascinating story of one man’s colorful, mysterious, and personal journey into the world of magic, and his unlikely invitation into an underground secret society of revolutionary magicians from...

Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy