Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The C++ Standard Library: A Tutorial and Reference (2nd Edition)
The C++ Standard Library: A Tutorial and Reference (2nd Edition)

The Best-Selling C++ Resource

Now Updated for C++11

 

The C++ standard library provides a set of common classes and interfaces that greatly extend the core C++ language. The library, however, is not self-explanatory. To make full...

Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Advances in Mathematical Modeling for Reliability
Advances in Mathematical Modeling for Reliability
Advances in Mathematical Modeling for Reliability discusses fundamental issues on mathematical modeling in reliability theory and its applications. Beginning with an extensive discussion of graphical modeling and Bayesian networks, the focus shifts towards repairable systems: a discussion about how sensitive availability calculations parameter...
Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Expert Web Services Security in the .NET Platform
Expert Web Services Security in the .NET Platform

Any company using .NET will eventually (if it hasn't already) expose part of its functionality as a .NET Web service, and securing these features will become job number one. Completely up to date for the latest version of Visual Studio .NET, Expert Web Services Security in the .NET Platform is a comprehensive treatment on how to...

Introduction to Cryptography
Introduction to Cryptography

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on...

Broadband Telecommunications Handbook
Broadband Telecommunications Handbook
THE BLOCKBUSTER OVERVIEW OF BROADBAND
Updated and Expanded to Reflect the Latest Technologies!

Whether you’re a “techie” or a business executive, getting a top-to-bottom understanding of broadband – the kind that will pay “real world” dividends at work -- has never been easier! In this...

An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required...
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.>

  • Comprehensive coverage and practical examples of the industry...

Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing
Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing

Interactive curve modeling techniques and their applications are extremely useful in a number of academic and industrial settings, and specifically play a significant role in multidisciplinary problem solving, such as in font design, designing objects, CAD/CAM, medical operations, scientific data visualization, virtual reality, character...

Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
C++ Standard Library: A Tutorial and Reference, The
C++ Standard Library: A Tutorial and Reference, The

C++ Standard Library provides a set of common classes and interfaces that greatly extend the core C++ language. The library, however, is not self-explanatory. To make full use of its components-and to benefit from their power-you need a resource that does far more than list the classes and...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy