|
|
|
|
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown... | | Introduction to Genetic Algorithms
The origin of evolutionary algorithmswas an attempt tomimic some of the processes taking place in natural evolution. Although the details of biological evolution are not completely understood (even nowadays), there exist some points supported by strong experimental evidence:
• Evolution is a process operating over chromosomes... | | Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first... |
|
|
Social Media Commerce For Dummies
Capture customers and sales with social media commerce
Social media commerce is a booming industry. By using social networks in the context of e-commerce transactions, brands large and small are making their products more available and more convenient for customers. This one-of-a-kind guide introduces you to social media... | | | | SMART Board Interactive Whiteboard For Dummies
The easy-to-use guide to SMART Board® interactive whiteboards
SMART Board interactive whiteboards—which combine the functionality of a computer with the simplicity of a whiteboard—are rapidly becoming fixtures in classrooms, boardrooms, and lecture halls everywhere. While these high tech devices are... |
|
|
|
Result Page: 899 898 897 896 895 894 893 892 891 890 889 888 887 886 885 884 883 882 881 |