Post Quantum Cryptography Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... Pro DNS and BIND Every time you get e-mail, every time you access a web page, you use the Domain Name
System (DNS). In fact, over 2 billion such requests hit the DNS root-servers alone every day.
Every one of those 2 billion requests originate from a DNS that supports a group of local users,
and every one of them is finally answered by a DNS server...
Handbook of Integral Equations Integral equations are encountered in various fields of science and numerous applications (in elasticity, plasticity, heat and mass transfer, oscillation theory, fluid dynamics, filtration theory, electrostatics, electrodynamics, biomechanics, game theory, control, queuing theory, electrical engineering, economics, medicine, etc.).
Nanomaterials and Plant Potential
This book discusses the latest developments in plant-mediated fabrication of metal and metal-oxide nanoparticles, and their characterization by using a variety of modern techniques. It explores in detail the application of nanoparticles in drug delivery, cancer treatment, catalysis, and as antimicrobial agent, antioxidant and the...
|Result Page: 49 48 47 46 45 44 43 42 41 40 |