Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary is your full reference resource for all things cryptography.

Cryptography from A5/0 to ZRTP
 
Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for
...
Behold a Pale Horse
Behold a Pale Horse
Sometime ago I had the opportunity to meet William Cooper and his wife Annie. It was part of my job to verify whether this man did indeed speak the truth or was just another person seeking fame and fortune. What I found was a rugged, bulldog, driven individual who was kind, thoughtful and tenderhearted. He was truly concerned about you and your...
Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001 (Penguin Books)
Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001 (Penguin Books)
Winner of the 2005 Pulitzer Prize

The explosive first-hand account of America's secret history in Afghanistan


With the publication of Ghost Wars, Steve Coll became not only a Pulitzer Prize winner, but also the expert on the rise of the Taliban, the emergence of Bin Laden, and the secret
...
Professional Python
Professional Python

Master the secret tools every Python programmer needs to know

Professional Python goes beyond the basics to teach beginner- and intermediate-level Python programmers the little-known tools and constructs that build concise, maintainable code. Design better architecture and write easy-to-understand code using highly...

Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills)
Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills)
Experiment with cryptography — the science of secret writing. Cipher and decipher codes: transposition and polyalphabetical ciphers, famous codes, typewriter and telephone codes, codes that use playing cards, knots, and swizzle sticks...even invisible writing and sending messages through outer space. Hours of intrigue and challenge. 45...
Outspoken: Free Speech Stories
Outspoken: Free Speech Stories
"America's national obsession with asserting, and quelling, free-speech comes alive in this collection of profiles of First Amendment firebrands.Ê.Ê.Ê. The author goes beyond the usual polarized corners of political correctness.Ê.Ê.Ê.Êher nuanced treatment of all sides of the debate makes this a...
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
The vast expansion and rigorous treatment of cryptography is one of the major achievements of theoretical computer science. In particular, concepts such as computational indistinguishability, pseudorandomness and zero-knowledge interactive proofs were introduced, classical notions such as secure encryption and unforgeable signatures were placed on...
Decrypted Secrets: Methods and Maxims of Cryptology
Decrypted Secrets: Methods and Maxims of Cryptology
"The best single book on cryptology today." --Cryptologia (from a review of a previous edition)

"It is an outstanding book that assumes only elementary mathematical knowledge and is interspersed with many exciting, amusing, and sometimes personal stories from the history of cryptology."
...
Cryptography for Internet & Database Applications
Cryptography for Internet & Database Applications
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Mathematics for Computer Graphics
Mathematics for Computer Graphics
Baffled by maths? Then don't give up hope. John Vince will show you how to understand many of the mathematical ideas used in computer animation, virtual reality, CAD, and other areas of computer graphics. In thirteen chapters you will rediscover - and hopefully discover for the first time a new way of understanding - the mathematical techniques...
Secret Recipes of the Python Ninja: Over 70 recipes that uncover powerful programming tactics in Python
Secret Recipes of the Python Ninja: Over 70 recipes that uncover powerful programming tactics in Python

Test your Python programming skills by solving real-world problems

Key Features

  • Access built-in documentation tools and improve your code.
  • Discover how to make the best use of decorator and generator functions
  • Enhance speed and improve concurrency by...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy