Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Domain-Specific Languages (Addison-Wesley Signature Series (Fowler))
Domain-Specific Languages (Addison-Wesley Signature Series (Fowler))

When carefully selected and used, Domain-Specific Languages (DSLs) may simplify complex code, promote effective communication with customers, improve productivity, and unclog development bottlenecks. In Domain-Specific Languages, noted software development expert Martin Fowler first provides the information software...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

C++ How to Program (8th Edition)
C++ How to Program (8th Edition)

Welcome to the C++ computer programming language and C++ How to Program, Eighth Edition! This book presents leading-edge computing technologies, and is particularly appropriate for inroductory course sequences based on the curriculum recommendations of two key professional organizations—the ACM and the IEEE.

The new...

Java How to Program (early objects) (9th Edition) (Deitel)
Java How to Program (early objects) (9th Edition) (Deitel)

Welcome to Java and Java How to Program, Ninth Edition! This book presents leadingedge computing technologies for students, instructors and software developers.

The new Chapter 1 engages students with intriguing facts and figures to get them excited about studying computers and programming. The chapter includes a table of some of...

New Perspectives on HTML and XHTML: Comprehensive (New Perspectives (Course Technology Paperback))
New Perspectives on HTML and XHTML: Comprehensive (New Perspectives (Course Technology Paperback))

The New Perspectives Series’ critical-thinking, problem-solving approach is the ideal way to prepare students to transcend point-and-click skills and take advantage of all that the World Wide Web has to offer.

Our goal in developing the New Perspectives Series was to create books that give students the software concepts...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

C: How to Program (6th Edition)
C: How to Program (6th Edition)

Welcome to the C programming language—and to C++, too! This book presents leadingedge computing technologies for students, instructors and software development professionals.

At the heart of the book is the Deitel signature “live-code approach.” Concepts are presented in the context of complete working...

Fundamentals of Speaker Recognition
Fundamentals of Speaker Recognition
When I was being interviewed at the handwriting recognition group of IBM T.J. Watson Research Center in December of 1990, one of the interviewers asked me why, being a mechanical engineer, I was applying for a position in that group. Well, he was an electrical engineer and somehow was under the impression that handwriting...
Time Domain Electromagnetics (Academic Press Series in Engineering)
Time Domain Electromagnetics (Academic Press Series in Engineering)
In recent times, we have seen increased interest in the direct time domain methods to calculate electromagnetic scattering/interaction phenomenon. This may be due to the surge in activities in the areas of EMP, short-pulse radar, or other related applications. It may also be due to the fact that the time domain methods have several...
The C++ Standard Library: A Tutorial and Reference (2nd Edition)
The C++ Standard Library: A Tutorial and Reference (2nd Edition)

The Best-Selling C++ Resource

Now Updated for C++11

 

The C++ standard library provides a set of common classes and interfaces that greatly extend the core C++ language. The library, however, is not self-explanatory. To make full...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy