 |
|
|
|
|
 Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from
reading your files, and cryptography that will stop major governments from reading your files. This
book is about the latter.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the... |  |  Analog-to-Digital Conversion
A book is like a window that allows you to look into the world. The window is
shaped by the author and that makes that every window presents a unique view of
the world. This is certainly true for this book. It is shaped by the topics and the
projects throughout my career. Even more so, this book reflects my own style of
working and... |  |  Introducing Microsoft® Silverlight(TM) 3
As the Web grows and evolves, so do the expectations of the Web user. When the first
Web browser was developed, it was created to provide a relatively simple way to allow
hyperlinking between documents. Then these early browsers were coupled with the
cross-machine protocols encompassing the Internet, and suddenly documents stored on... |
|
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 |