Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Signatures (Advances in Information Security)
Digital Signatures (Advances in Information Security)

As a beginning graduate student, I recall being frustrated by a general lack of accessible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren’t there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my...

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
An Introduction to Tensors and Group Theory for Physicists
An Introduction to Tensors and Group Theory for Physicists

The second edition of this highly praised textbook provides an introduction to tensors, group theory, and their applications in classical and quantum physics. Both intuitive and rigorous, it aims to demystify tensors by giving the slightly more abstract but conceptually much clearer definition found in the math literature, and then connects...

Bike, Scooter, and Chopper Projects for the Evil Genius
Bike, Scooter, and Chopper Projects for the Evil Genius
Greetings! Glad that you decided to take an interest in the best hobby you will ever know! Maybe you are already a seasoned garage hacker and have decided to build a few of the projects from this book, adding your own special modifications, of course. Or, maybe you have never thought about taking an angle grinder to a working bicycle, chopping it...
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
A Course in Real Analysis
A Course in Real Analysis

A Course in Real Analysis provides a firm foundation in real analysis concepts and principles while presenting a broad range of topics in a clear and concise manner. This student-oriented text balances theory and applications, and contains a wealth of examples and exercises. Throughout the text, the authors adhere to the idea that most...

Mobile Backhaul
Mobile Backhaul

Comprehensive coverage of IP/MPLS/Ethernet backhaul technologies and solutions for 3GPP mobile network systems such as LTE, HSPA and GPRS

Focusing on backhaul from a radio network viewpoint, Mobile Backhaul combines perspectives on mobile networks and transport network technologies, focusing on mobile backhaul specific...

An Introduction to Modern Cosmology
An Introduction to Modern Cosmology
An Introduction to Modern Cosmology Second Edition is an accessible account of modern cosmological ideas.  The Big Bang Cosmology is explored, looking at its observational successes in explaining the expansion and age of the universe, the existence and properties of the cosmic microwave background, and the origin of the light elements...
Foundations Of Algorithms Using C++ Pseudocode
Foundations Of Algorithms Using C++ Pseudocode

This third edition of Foundations of Algorithms Using C++ Pseudocode retains the features that made the second edition successful. As in the second edition, we still use pseudocode and not actual C++ code. The presentation of complex algorithms using all the details of any programming language would...

Mathematics for Physicists and Engineers: Fundamentals and Interactive Study Guide
Mathematics for Physicists and Engineers: Fundamentals and Interactive Study Guide

This textbook offers an accessible and highly-effective approach which is characterised by the combination of the textbook with a detailed study guide on an accompanying CD. This study guide divides the whole learning task into small units which the student is very likely to master successfully. Thus he or she is asked to read and study a...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy