Making, Breaking Codes: Introduction to Cryptology
This book is an introduction to modern ideas in cryptology and how to employ
these ideas. It includes the relevant material on number theory, probability, and
abstract algebra, in addition to descriptions of ideas about algorithms and com
plexity theory. Three somewhat different terms appear in the discussion of secure
Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...
Epistemology, Context, and Formalism (Synthese Library)
The main purpose of the present volume is to advance our understanding of the notions of knowledge and context, the connections between them and the ways in which they can be modeled, in particular formalized – a question of prime importance and utmost relevance to such diverse disciplines as philosophy, linguistics, computer science...
The Mechatronics Handbook (Electrical Engineering Handbook) The Mechatronics Handbook is highly recommended for academic libraries supporting undergraduate or advanced programs in electronics, electrical engineering, computer science, robotics, and related subjects.
-Holly Flynn, Mathematics Librarian, Michigan State University Vernon G. Grove Research Library
…This handbook is a...
Cryptanalytic Attacks on RSA RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science.... Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
Near Rings, Fuzzy Ideals, and Graph Theory
Near Rings, Fuzzy Ideals, and Graph Theory explores the relationship between near rings and fuzzy sets and between near rings and graph theory. It covers topics from recent literature along with several characterizations.
After introducing all of the necessary fundamentals of algebraic systems, the book presents...
Perl One-Liners: 130 Programs That Get Things Done
Part of the fun of programming in Perl lies in tackling tedious tasks with short, efficient, and reusable code. Often, the perfect tool is the one-liner, a small but powerful program that fits in one line of code and does one thing really well.
In Perl One-Liners, author and impatient hacker Peteris...
History of Jewish Philosophy (Routledge History of World Philosophies)
This volume is planned as a companion to the Routledge History of Islamic Philosophy,
and both take their place in the Routledge History of World Philosophies, a series
designed to supplement and amplify the Routledge History of Philosophy. The idea of
placing histories of Islamic and Jewish philosophy in such close proximity to a...
|Result Page: 12 11 10 9 8 7 6 5 4 3 |