Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
Near Rings, Fuzzy Ideals, and Graph Theory
Near Rings, Fuzzy Ideals, and Graph Theory

Near Rings, Fuzzy Ideals, and Graph Theory explores the relationship between near rings and fuzzy sets and between near rings and graph theory. It covers topics from recent literature along with several characterizations.

After introducing all of the necessary fundamentals of algebraic systems, the book presents...

Exploring Abstract Algebra With Mathematica®
Exploring Abstract Algebra With Mathematica®
This upper-division laboratory supplement for courses in abstract algebra consists of several Mathematica packages programmed as a foundation for group and ring theory. Additionally, the "user's guide" illustrates the functionality of the underlying code, while the lab portion of the book reflects the contents of the...
Network Warrior
Network Warrior

The examples used in this book are taken from my own experiences, as well as from the experiences of those with or for whom I have had the pleasure of working. Of course, for obvious legal and honorable reasons, the exact details and any information that might reveal the identities of the other parties involved have been changed.

...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Why We Fight: One Man's Search for Meaning Inside the Ring
Why We Fight: One Man's Search for Meaning Inside the Ring

A physical and philosophical mediation on why we are drawn to fight each other for sport, what happens to our bodies and brains when we do, and what it all means

Anyone with guts or madness in him can get hit by someone who knows how; it takes a different kind of madness, a more persistent
...

Theoretical Physics
Theoretical Physics
Classic one-volume treatise covers mathematical topics needed by theoretical and experimental physicists (vector analysis, calculus of variations, etc.), followed by extensive coverage of mechanics, electromagnetic theory, thermodynamics, quantum mechanics, and nuclear physics. Indispensable reference for graduates and undergraduates.
...
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and...

Internetworking Troubleshooting Handbook (2nd Edition)
Internetworking Troubleshooting Handbook (2nd Edition)
If you can think of the problem, Internetworking Troubleshooting Handbook probably has the solution--at least when it comes to networking problems. This 714-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of networking woes, you will find pragmatic tips that can help you through an...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

CCIE: Cisco Certified Internetwork Expert Study Guide, Second Edition
CCIE: Cisco Certified Internetwork Expert Study Guide, Second Edition

Here's the book you need to prepare for Cisco's CCIE Qualification and Lab Exams. This Study Guide provides:

  • Assessment testing to focus and direct your studies
  • In-depth coverage of all exam objectives
  • Hundreds of challenging practice questions, in...
Cisco Router Configuration, Second Edition
Cisco Router Configuration, Second Edition
The objective of this book is to help you, the novice Cisco users, with the basic administration of your internetworking devices. Using straightforward case studies and practical examples, Cisco Router Configuration, 2E teaches IOS fundamentals for configuring, operating, and maintaining internetworking devices....
Result Page: 8 7 6 5 4 3 2 1 
┬ę2020 LearnIT (support@pdfchm.net) - Privacy Policy