 |
|
 Handbook of Financial Cryptography and Security
Cryptography has made a peculiar journey to become a modern science. It had long been
associated with the military and with magic. The rst published work in the eld was
Steganographia, by an alchemist named Trithemius. Although written earlier, the book was
published in 1606. Cryptography has continued this connection with the arcane... |  |  Domain-Specific Languages (Addison-Wesley Signature Series (Fowler))
When carefully selected and used, Domain-Specific Languages (DSLs) may simplify complex code, promote effective communication with customers, improve productivity, and unclog development bottlenecks. In Domain-Specific Languages, noted software development expert Martin Fowler first provides the information software... |  |  Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first... |
|
 Guide to Tactical Perimeter Defense
This course is the official courseware for the Security Certified Program SC0-451
certification exam. The Tactical Perimeter Defense course is designed to provide
network administrators and certification candidates with hands-on tasks on the
most fundamental perimeter security technologies. The network perimeter is often
the first... |  |  C++ How to Program (8th Edition)
Welcome to the C++ computer programming language and C++ How to Program, Eighth
Edition! This book presents leading-edge computing technologies, and is particularly appropriate
for inroductory course sequences based on the curriculum recommendations of
two key professional organizations—the ACM and the IEEE.
The new... |  |  Java How to Program (early objects) (9th Edition) (Deitel)
Welcome to Java and Java How to Program, Ninth Edition! This book presents leadingedge computing technologies for students, instructors and software developers.
The new Chapter 1 engages students with intriguing facts and figures to get them excited about studying computers and programming. The chapter includes a table of some of... |
|
|
 Fundamentals of Speaker Recognition
When I was being interviewed at the handwriting recognition group of IBM T.J.
Watson Research Center in December of 1990, one of the interviewers asked me
why, being a mechanical engineer, I was applying for a position in that group. Well,
he was an electrical engineer and somehow was under the impression that handwriting... |  |  Time Domain Electromagnetics (Academic Press Series in Engineering)
In recent times, we have seen increased interest in the direct time domain methods to calculate
electromagnetic scattering/interaction phenomenon. This may be due to the surge in activities
in the areas of EMP, short-pulse radar, or other related applications. It may also be due to the
fact that the time domain methods have several... |  |  |
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |