Home | Amazing | Today | Tags | Publishers | Years | Search 
HTML5 Multimedia Development Cookbook
HTML5 Multimedia Development Cookbook

Maybe you've heard the story—or probably urban legend—about the university that didn't lay any grass or pour any concrete when it first opened, leaving the campus grounds as solid dirt. Then, as students began to traverse the campus from one class to the next, campus planners mapped the common paths they took, and then...

Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark

You are holding the proceedings of FSE 2011, the 18th International Workshop on Fast Software Encryption. This workshop was organized in cooperation with the International Association for Cryptologic Research. It was held in Lyngby, Denmark, during February 13–16, 2011.

The FSE 2011 Program Committee (PC) consisted of...

SOA Modeling Patterns for Service Oriented Discovery and Analysis
SOA Modeling Patterns for Service Oriented Discovery and Analysis

One of the most challenging tasks in today’s business and information technology (IT) environments is to communicate a solution to an organizational problem in a simple manner that can be easily understood by business and IT personnel alike. Is it also arduous to explain in simple words how a remedy to an enterprise concern can be...

Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)
Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)

The present work grew out of lecture notes I prepared for a Vh hour tutorial that I was invited to give at the 29th IEEE Computer Conference (CompCon) in San Francisco on February 27, 1987. I have just completed a substantial update of the material, including the addition of several topics. My main purpose is to provide a...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The telegraph, telephone, radio, and especially the computer have put everyone on the globe within earshot— at the price of our privacy. It may feel like we're performing an intimate act when, sequestered in our rooms and cubicles, we casually use our cell phones and computers to transmit our thoughts, confidences,...

The Book of Ruby: A Hands-On Guide for the Adventurous
The Book of Ruby: A Hands-On Guide for the Adventurous

Ruby is famous for being easy to learn, but most users only scratch the surface of what it can do. While other books focus on Ruby's trendier features, The Book of Ruby reveals the secret inner workings of one of the world's most popular programming languages, teaching you to write clear, maintainable code.

...

Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

One of the most gripping yet improbable stories spawned by the computer revolution, Hacker Crocker is a classic American-dream success story set on the razor edge of high technology. Ejovi Nuwere takes the reader on the roller-coaster ride of his extraordinary life, from the bullet-riddled, drugged-out streets of one of America's...

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

iPhone 4S Made Simple: For iPhone 4S and Other iOS 5-Enabled iPhones (Made Simple Apress)
iPhone 4S Made Simple: For iPhone 4S and Other iOS 5-Enabled iPhones (Made Simple Apress)

In your hands is one of the most exciting devices to hit the market in quite some time: the iPhone 4S. This Quick Start Guide will help get you and your new iPhone 4S up and running in a hurry. You’ll learn all about the buttons, switches, and ports, and how to use the responsive touch screen, multitask and be introduced to Siri, the...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Result Page: 32 31 30 29 28 27 26 25 24 23 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy