Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.

The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following
...
Algorithmic Number Theory, Vol. 1: Efficient Algorithms (Foundations of Computing)
Algorithmic Number Theory, Vol. 1: Efficient Algorithms (Foundations of Computing)

Algorithmic Number Theory provides a thorough introduction to the design and analysis of algorithms for problems from the theory of numbers. Although not an elementary textbook, it includes over 300 exercises with suggested solutions. Every theorem not proved in the text or left as an exercise has a reference in the notes section...

Learning Data Mining with Python
Learning Data Mining with Python

Harness the power of Python to analyze data and create insightful predictive models

About This Book

  • Learn data mining in practical terms, using a wide variety of libraries and techniques
  • Learn how to find, manipulate, and analyze data using Python
  • Step-by-step instructions...
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Excel Data Analysis For Dummies
Excel Data Analysis For Dummies

Harness the power of Excel to discover what your numbers are hiding

Excel Data Analysis For Dummies, 2nd Edition is the ultimate guide to getting the most out of your data. Veteran Dummies author Stephen L. Nelson guides you through the basic and not-so-basic features of Excel to help you discover...

Core Principles of Special and General Relativity
Core Principles of Special and General Relativity

This book provides an accessible, yet thorough, introduction to special and general relativity, crafted and class-tested over many years of teaching. Suitable for advanced undergraduate and graduate students, this book provides clear descriptions of how to approach the mathematics and physics involved. It is also contains the latest...

Professional Crystal Reports for Visual Studio .NET, 2nd Edition
Professional Crystal Reports for Visual Studio .NET, 2nd Edition
The addition of Crystal Reports 9.0 to Visual Studio .NET 2003 offers developers a reporting tool that allows you to turn almost any data into interactive, dynamic content through portals, wireless devices, and Microsoft Office documents. This code-intensive guide takes you step by step through developing reports and incorporating them into...
IEEE Recommended Practice for the Design of Reliable Industrial and Commercial Power Systems
IEEE Recommended Practice for the Design of Reliable Industrial and Commercial Power Systems
The design of reliable industrial and commercial power systems is of considerable interest to many people. Prior to 1962, a qualitative viewpoint was taken when attempting to achieve this objective. The need for a quantitative approach was first recognized in the early 1960s when a small group of pioneers led by W. H. Dickinson...
Information Extraction: Algorithms and Prospects in a Retrieval Context (The Information Retrieval Series)
Information Extraction: Algorithms and Prospects in a Retrieval Context (The Information Retrieval Series)
Information extraction regards the processes of structuring and combining content that is explicitly stated or implied in one or multiple unstructured information sources. It involves a semantic classification and linking of certain pieces of information and is considered as a light form of content understanding by the machine. Currently, there is...
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1

The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.

On the other hand I've...

C# Programming: From Problem Analysis to Program Design
C# Programming: From Problem Analysis to Program Design

C# Programming: From Problem Analysis to Program Design requires no previous introduction to programming and only a mathematical background of high school algebra. The book uses C# as the programming language for software development; however, the basic programming concepts presented can be applied to a number of other languages....

Result Page: 289 288 287 286 285 284 283 282 281 280 279 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy