Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intelligent Multimedia Data Hiding: New Directions (Studies in Computational Intelligence)
Intelligent Multimedia Data Hiding: New Directions (Studies in Computational Intelligence)
This book presents the latest research in the area of multimedia data hiding paradigms. The book is divided into four parts and an appendix. The first part introduces multimedia signal processing and information hiding techniques. It includes multimedia representation, need for multimedia, digital watermarking fundamentals and requirements of...
Cryptography in C and C++
Cryptography in C and C++

This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of additional material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the latest cryptographic...

Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply...

Practical System Programming with C: Pragmatic Example Applications in Linux and Unix-Based Operating Systems
Practical System Programming with C: Pragmatic Example Applications in Linux and Unix-Based Operating Systems

This book teaches system programming with the latest versions of C through a set of practical examples and problems. It covers the development of a handful of programs, implementing efficient coding examples.  

Practical System Programming with C contains three main parts: getting your hands dirty with...

Zero to One: Notes on Startups, or How to Build the Future
Zero to One: Notes on Startups, or How to Build the Future

#1 NEW YORK TIMES BESTSELLER


If you want to build a better future, you must believe in secrets.


The great secret of our time is that there are still uncharted frontiers to explore and new inventions to create. In Zero to One, legendary entrepreneur and investor Peter Thiel
...

Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling...
Military Intelligence Blunders
Military Intelligence Blunders

This is a book that tries to tell the story of some recent events, all within living memory, from a different angle: intelligence. Most of us have read press accounts and books about the events that unfold on these pages. But very few of us have seen the events from the inside. The inside implies knowledge: and knowledge means power.

...

Taking Your iPod touch to the Max
Taking Your iPod touch to the Max

Unleash your iPod touch and take it to the limit using secret tips and techniques from gadget hacker Erica Sadun. Fast and fun to read, Taking Your iPod touch to the Max will help you get the most out of your iPod touch.

You’ll find all the best undocumented tricks as well as the most efficient and enjoyable
...

Quantum Cryptography and Secret-Key Distillation
Quantum Cryptography and Secret-Key Distillation
This book aims at giving an introduction to the principles and techniques of quantum cryptography, including secret-key distillation, as well as some more advanced topics. As quantum cryptography is now becoming a practical reality with products available commercially, it is important to focus not only on the theory of quantum...
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The telegraph, telephone, radio, and especially the computer have put everyone on the globe within earshot— at the price of our privacy. It may feel like we're performing an intimate act when, sequestered in our rooms and cubicles, we casually use our cell phones and computers to transmit our thoughts, confidences,...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy