|
|
|
|
|
Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... | | | | Information Security and Cryptology: 5th International Conference, Inscrypt 2009
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are... |
|
| | Developing Your Conflict Competence: A Hands-On Guide for Leaders, Managers, Facilitators, and Teams
A practical resource, this book combines tips, checklists, exercises, and stories to outline concrete processes that improve the way leaders, managers, and anyone within an organization responds to conflict. Beginning with a series of questions and self-diagnostics, the authors show you how to: maintain emotional balance in the face of... | | |
|
Driving Technical Change
Finding cool languages, tools, or development techniques is easy-new ones are popping up every day. Convincing co-workers to adopt them is the hard part. The problem is political, and in political fights, logic doesn't win for logic's sake. Hard evidence of a superior solution is not enough. But that reality can be tough for... | | Info We Trust: How to Inspire the World with Data
How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing.
Creating Info We Trust is a craft that puts the world into forms that are strong and true. It begins with maps,... | | The Craft of System Security"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how... |
|
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |