Home | Amazing | Today | Tags | Publishers | Years | Search 
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

A Classical Introduction to Cryptography: Applications for Communications Security
A Classical Introduction to Cryptography: Applications for Communications Security
From the reviews:

"This impressive hardback introduces fundamentals of information and communications security by providing mathematical concepts to prove or break the security of cryptographic schemes. … The book is designed for upper-level undergraduates and graduate level students in computer science. This comprehensive volume is...

Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
C+ + for Programmers (Deitel Developer Series)
C+ + for Programmers (Deitel Developer Series)
The professional programmer’s DEITEL® guide to C++ and object-oriented application development

Written for programmers with a background in high-level language programming, this book applies the Deitel signature live-code approach to teaching programming and explores the C++ language and C++ Standard
...
Serial Violence: Analysis of Modus Operandi and Signature Characteristics of Killers
Serial Violence: Analysis of Modus Operandi and Signature Characteristics of Killers
Written by renowned experts Bob Keppel and William Birnes, this book focuses on analyzing crimes of violence to unveil common characteristics that might prove useful in the successful identification, apprehension, and conviction of murderers. It details the historical origins of modus operandi as an investigative tool and discusses modern...
Dictionary of e-Business: A Definitive Guide to Technology and Business Terms
Dictionary of e-Business: A Definitive Guide to Technology and Business Terms
In a fast-moving technical and business environment like the Internet only exactitude can guarantee success. An 'almost correct' specification is a wrong specification. Make total accuracy your signature with this invaluable guide.

It offers detailed definitions of the bewildering array of terms and phrases relating to e-Business and the...

Discover Signal Processing: An Interactive Guide for Engineers
Discover Signal Processing: An Interactive Guide for Engineers

Signal processing is now a multidisciplinary topic, and one that has applications in many fields including, but not limited to, science, engineering, medicine, finance and the behavioural sciences. Modern software libraries that include dedicated languages and packages designed to simplify the development and application of signal processing...

Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Random Curves: Journeys of a Mathematician
Random Curves: Journeys of a Mathematician
These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital signature, cover many topics besides his own personal career in mathematics and cryptography - travels to the Soviet Union, Latin America, Vietnam and elsewhere, political activism, and academic controversies relating to math...
Security for Web Services and Service-Oriented Architectures
Security for Web Services and Service-Oriented Architectures

Web services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with...

How to Make Money in Stocks: A Winning System in Good Times or Bad
How to Make Money in Stocks: A Winning System in Good Times or Bad
William J. O'Neil's proven investment advice has earned him millions of loyal followers. And his signature bestseller, How to Make Money in Stocks, contains all the guidance readers need on the entire investment process­­from picking a broker to diversifying a portfolio to making a million in mutual funds. For self-directed investors of...
Cocoa Touch for iPhone OS 3 (Developer Reference)
Cocoa Touch for iPhone OS 3 (Developer Reference)

Join the gold rush to developing cool iPhone apps with this complete iPhone OS 3 developer’s guide. Professional developer Jiva DeVoe speaks your language, and he talks you through the entire process—from explaining Cocoa Touch and the iPhone SDK to using Xcode and the Game Kit API. Follow step-by-step tutorials, then apply practical...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy