Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C Programming - A Beginner's Course
C Programming - A Beginner's Course
Comments posted online for C Programming – A Beginner's Course: "The text does a great job of explaining concepts and the examples are pretty good." "It covers a lot of ideas and concepts that are left out of the other beginner books." "This book does such a good job at explaining the fundamentals of the...
Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Two Scoops of Django: Best Practices For Django 1.5
Two Scoops of Django: Best Practices For Django 1.5

Update!

The third edition, Two Scoops of Django: Best Practices For Django 1.8 is available! Revised and expanded to 532 pages, it's a whole new book full of new material. Please consider it before purchasing this edition!

http://www.amazon.com/Two-Scoops-Django-Best-Practices/dp/0981467342

...
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

101 Spy Gadgets for the Evil Genius
101 Spy Gadgets for the Evil Genius
101 SPY DEVICES FOR SERIOUS SNOOPING

This book offers an amazingly awesome and complete collection of professional spy tools that you can build yourself. You can build any project in this thrilling arsenal of spy devices for $30 or less! Not only that, even total beginners to electronics can construct these mind-boggling...

Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

Experimenting with AVR Microcontrollers
Experimenting with AVR Microcontrollers

AVR is the brain that runs Arduino, but you don't need the whole Arduino board to do fun projects. Experimenting with AVR Microcontrollers, from Practical AVR Microcontrollers, shows you how to create a spiffy set of projects that you can build to learn more about electronics, about AVR, and just to generate new ideas...

Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

The Cryptoclub: Using Mathematics to Make and Break Secret Codes
The Cryptoclub: Using Mathematics to Make and Break Secret Codes
Join the Cryptokids as they apply basic mathematics to make and break secret codes. This book has many hands-on activities that have been tested in both classrooms and informal settings. Classic coding methods are discussed, such as Caesar, substitution, Vigenère, and multiplicative ciphers as well as the modern RSA. Math topics covered...
Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Result Page: 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy