Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algorithmic Cryptanalysis (Cryptography and Network Security)
Algorithmic Cryptanalysis (Cryptography and Network Security)
Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,...
Castles and Fortified Cities of Medieval Europe: An Illustrated History
Castles and Fortified Cities of Medieval Europe: An Illustrated History

During the Middle Ages, castles and other fortified buildings were a common feature of the European landscape. As central powers rose and fell, the insecurity of the time inspired a revival of fortification techniques first introduced in the Roman Empire. Despite limitations in construction techniques and manpower, medieval fortifications...

Yogurt Every Day: Healthy and Delicious Recipes for Breakfast, Lunch, Dinner and Dessert
Yogurt Every Day: Healthy and Delicious Recipes for Breakfast, Lunch, Dinner and Dessert

Hailed as a superfood and loved for its cool, tangy taste, yogurt's popularity continues to grow. Yogurt Every Day feeds this frenzy for yogurt, serving up 75 delicious recipes for breakfast, lunch, dinner, snacks and dessert, including how to make your own yogurt at home.


After years of
...

The Seventh Function of Language: A Novel
The Seventh Function of Language: A Novel

From the prizewinning author of HHhH, “the most insolent novel of the year” (L’Express) is a romp through the French intelligentsia of the twentieth century.

Paris, 1980. The literary critic Roland Barthes dies―struck by a laundry van―after lunch with the presidential...

Explorations in Information Space: Knowledge, Actor, and Firms
Explorations in Information Space: Knowledge, Actor, and Firms
As humankind seeks to extend its spatiotemporal reach both on and beyond its planet, it is constantly being forced by a recalcitrant nature to renegotiate the terms of its covenant with her. In some cases, the bargaining gets tough and nature takes offence, gradually revealing her anger with the terms that humanity seeks to impose on her through...
The History of Approximation Theory: From Euler to Bernstein
The History of Approximation Theory: From Euler to Bernstein

The problem of approximating a given quantity is one of the oldest challenges faced by mathematicians. Its increasing importance in contemporary mathematics has created an entirely new area known as Approximation Theory. The modern theory was initially developed along two divergent schools of thought: the Eastern or Russian group, employing...

Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
Suse Linux Integration Guide for IBM Elogo Server Xseries and Netfinity
This redbook will help you install, tailor and configure the SuSE Linux 7.0 distribution on different servers of the xSeries and Netfinity class. You will be instructed on how to do the basic installation, and installing and configuring different services such as Apache (http-Server), Samba (Fileserver for Windows-based networks), and Postfix (an...
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011

Over the last few decades, energy minimization methods have become an established paradigm to resolve a variety of challenges in the fields of computer vision and pattern recognition. While traditional approaches to computer vision were often based on a heuristic sequence of processing steps and merely allowed a very limited...

Linux System Administration and Backup Tools for IBM Elogo Server Xseries and Netfinity
Linux System Administration and Backup Tools for IBM Elogo Server Xseries and Netfinity
This redbook gives you an understanding of the unified system administration incorporated in the Caldera OpenLinux, Red Hat Linux, SuSE Linux and TurboLinux operating systems. It also provides information on three Linux backup and recovery applications supported by these operating systems.

This redbook provides an understanding of Linux
...
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management
Personal Web Usage in the Workplace: A Guide to Effective Human Resources Management

An important aspect of managing human capital in the 21st century workplace is managing the interface between humans and information technology, particularly the World Wide Web. The Web has changed not only how and where business is conducted, but also how and where work is done. Personal web usage has created many desirable organizational...

Five Minutes on Mondays: Finding Unexpected Purpose, Peace, and Fulfillment at Work
Five Minutes on Mondays: Finding Unexpected Purpose, Peace, and Fulfillment at Work

Five Minutes on Mondays is a gold mine of enrichment…It is an easy read with a deep and profound impact.”

Martin Rutte, Chair of the Board, The Centre for Spirituality and the Workplace, Saint Mary’s University, co-author of New York Times business...

Red Hat Linux Security and Optimization
Red Hat Linux Security and Optimization
Your Official Red Hat® Linux® Guide to Security and Optimization Reviewed and approved by the experts at Red Hat, this comprehensive guide delivers the know-how you need to improve the performance of your Red Hat Linux system—and protect it from attacks and break-ins. Red Hat Linux expert Mohammed Kabir starts by...
Result Page: 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy