|
|
|
|
Legendary Artists and the Clothes They Wore
Whether it’s Cecil Beaton’s flamboyant, classically tailored suits, Frida Kahlo’s love of bright color, or Cindy Sherman’s penchant for minimalism, an artist’s attire often reflects the creative and spiritual essence of his or her work. In Legendary Artists and the Clothes They Wore, fashion... | | La Passione: How Italy Seduced the World
A jubilant celebration of Italy’s outsize impact on culture, from literature to art, music to movies, that “masterfully examines the multitude of reasons why so many people fall in love with Italy and the Italian lifestyle” (Forbes)
Can you imagine painting without Leonardo, opera ... | | Practical Signcryption (Information Security and Cryptography)
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives... |
|
Hack Proofing Your IdentityThe use of a seal, card, or other identification while making a purchase or signing a contract is a custom almost as old as history. As merchants and their customers have begun using the Internet in recent years to conduct business online, they have been challenged to find digital forms of identification that mimic traditional, ... | | How to Make Money in Stocks: A Winning System in Good Times or BadWilliam J. O'Neil's proven investment advice has earned him millions of loyal followers. And his signature bestseller, How to Make Money in Stocks, contains all the guidance readers need on the entire investment processfrom picking a broker to diversifying a portfolio to making a million in mutual funds. For self-directed investors of... | | Intellectual Property Protection in VLSI Design: Theory and PracticeThe development and implementation of intellectual property (IP) protection mechanisms is of crucial importance for the emerging reuse-based system design methodology. Maybe even more importantly, it is such an elegant scientific and engineering challenge that it has drawn a lot of attention from academia and industry in recent years.... |
|
|
Information ScienceFrom cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains... | | Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... | | Information Security and Cryptology: 5th International Conference, Inscrypt 2009
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |