Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Cryptography: Principles and Applications
Introduction to Cryptography: Principles and Applications
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on an...

Machine Learning in Document Analysis and Recognition (Studies in Computational Intelligence)
Machine Learning in Document Analysis and Recognition (Studies in Computational Intelligence)
The objective of Document Analysis and Recognition (DAR) is to recognize the text and graphical components of a document and to extract information. With first papers dating back to the 1960’s, DAR is a mature but still growing research field with consolidated and known techniques. Optical Character Recognition (OCR) engines are some of the...
Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing
Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing

Interactive curve modeling techniques and their applications are extremely useful in a number of academic and industrial settings, and specifically play a significant role in multidisciplinary problem solving, such as in font design, designing objects, CAD/CAM, medical operations, scientific data visualization, virtual reality, character...

Implementation Patterns (Addison-Wesley Signature)
Implementation Patterns (Addison-Wesley Signature)
Software Expert Kent Beck Presents a Catalog of Patterns Infinitely Useful for Everyday Programming

 

Great code doesn’t just function: it clearly and consistently communicates your intentions, allowing other programmers to understand your code, rely on it, and modify...

Advanced CISSP Prep Guide: Exam Q & A
Advanced CISSP Prep Guide: Exam Q & A

Get ready to pass the CISSP exam and earn your certification with this advanced test guide

Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers,...

In a Roman Kitchen: Timeless Recipes from the Eternal City
In a Roman Kitchen: Timeless Recipes from the Eternal City

From the savory splendor of crisply fried artichokes to the easy indulgence of spaghetti alla carbonara perfectly al dente, the cooking of Rome is every bit as glorious as the city’s breathtaking art and architecture. In a Roman Kitchen explores the delights of this rich culinary heritage with a spectacular tour of the markets,...

Machine Vision : Theory, Algorithms, Practicalities
Machine Vision : Theory, Algorithms, Practicalities
In the last 40 years, machine vision has evolved into a mature field embracing a wide range of applications including surveillance, automated inspection, robot assembly, vehicle guidance, traffic monitoring and control, signature verification, biometric measurement, and analysis of remotely sensed images. While researchers and industry specialists...
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,...
Information Science
Information Science
From cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains...
Refactoring HTML: Improving the Design of Existing Web Applications (The Addison-Wesley Signature Series)
Refactoring HTML: Improving the Design of Existing Web Applications (The Addison-Wesley Signature Series)
Like any other software system, Web sites gradually accumulate “cruft” over time. They slow down. Links break. Security and compatibility problems mysteriously appear. New features don’t integrate seamlessly. Things just don’t work as well. In an ideal world, you’d rebuild from scratch. But you can’t:...
Intellectual Property Protection in VLSI Design: Theory and Practice
Intellectual Property Protection in VLSI Design: Theory and Practice
The development and implementation of intellectual property (IP) protection mechanisms is of crucial importance for the emerging reuse-based system design methodology. Maybe even more importantly, it is such an elegant scientific and engineering challenge that it has drawn a lot of attention from academia and industry in recent years....
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required...
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy