Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Epistemology, Context, and Formalism (Synthese Library)
Epistemology, Context, and Formalism (Synthese Library)

The main purpose of the present volume is to advance our understanding of the notions of knowledge and context, the connections between them and the ways in which they can be modeled, in particular formalized – a question of prime importance and utmost relevance to such diverse disciplines as philosophy, linguistics, computer science...

The Mechatronics Handbook (Electrical Engineering Handbook)
The Mechatronics Handbook (Electrical Engineering Handbook)
The Mechatronics Handbook is highly recommended for academic libraries supporting undergraduate or advanced programs in electronics, electrical engineering, computer science, robotics, and related subjects.
-Holly Flynn, Mathematics Librarian, Michigan State University Vernon G. Grove Research Library

…This handbook is a
...
Cryptanalytic Attacks on RSA
Cryptanalytic Attacks on RSA
RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science....
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
Near Rings, Fuzzy Ideals, and Graph Theory
Near Rings, Fuzzy Ideals, and Graph Theory

Near Rings, Fuzzy Ideals, and Graph Theory explores the relationship between near rings and fuzzy sets and between near rings and graph theory. It covers topics from recent literature along with several characterizations.

After introducing all of the necessary fundamentals of algebraic systems, the book presents...

Perl One-Liners: 130 Programs That Get Things Done
Perl One-Liners: 130 Programs That Get Things Done

Part of the fun of programming in Perl lies in tackling tedious tasks with short, efficient, and reusable code. Often, the perfect tool is the one-liner, a small but powerful program that fits in one line of code and does one thing really well.

In Perl One-Liners, author and impatient hacker Peteris
...

History of Jewish Philosophy (Routledge History of World Philosophies)
History of Jewish Philosophy (Routledge History of World Philosophies)
This volume is planned as a companion to the Routledge History of Islamic Philosophy, and both take their place in the Routledge History of World Philosophies, a series designed to supplement and amplify the Routledge History of Philosophy. The idea of placing histories of Islamic and Jewish philosophy in such close proximity to a...
Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics
Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics
From the reviews:

"This book presents a large number of probabilistic aspects of cryptographic systems . All the classical statistical tests on random sequences are motivated and precisely detailed here. This book is surely a valuable companion to the NIST standard reference ." (Jérémie Bourdon, Mathematical...

Complex Analysis (Princeton Lectures in Analysis, No. 2)
Complex Analysis (Princeton Lectures in Analysis, No. 2)

With this second volume, we enter the intriguing world of complex analysis. From the first theorems on, the elegance and sweep of the results is evident. The starting point is the simple idea of extending a function initially given for real values of the argument to one that is defined when the argument is complex. From there, one proceeds to...

Computational Chemistry: Reviews of Current Trends (Computational Chemistry: Reviews of Current Trends, Vol 6)
Computational Chemistry: Reviews of Current Trends (Computational Chemistry: Reviews of Current Trends, Vol 6)

There are strong indications that, in the 21st century, computational chemistry will be a prime research tool not only for the basic sciences but also for the life and materials sciences. Recent developments in nanotechnology allow us to detect a layer of single atoms. Researchers are able not only to image but also to manipulate molecules...

Result Page: 12 11 10 9 8 7 6 5 4 3 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy