Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
The origins of this book are part of an interesting period of my life. A period that
saw me move from a shy and disorganized young adult, into a software developer
who has toured various parts of the world, and met countless new friends and
colleagues. It all began in December of 2001, nearly five years ago. I started a
project
...
The Business of Streaming and Digital Media
The Business of Streaming and Digital Media
"...provides a number of very useful hints on how to make streaming successful (rather than merely profitable)."
EBU Technical Review

"This book offers a useful guide for building and managing a streaming and digital media business ... successfully." EBU Book Review

This book answers the
...
Memory as a Programming Concept in C and C++
Memory as a Programming Concept in C and C++

The overwhelming majority of program bugs and computer crashes stem from problems of memory access, allocation, or deallocation. Such memory-related problems are also notoriously difficult to debug. Yet the role that memory plays in C and C++ programming is a subject often overlooked in courses and books because it requires specialized knowledge...

The Street Smart MBA: 10 Proven Strategies for Driving Business Success
The Street Smart MBA: 10 Proven Strategies for Driving Business Success

Business schools have long enticed students into their MBA programs with the promise that, after a short stint spent studying the ins and outs of the business world, they will be able to step right into the upper echelons of management or launch a business that soon has them flitting about the world in a private jet. "Sounds great,"...

Informatics: 10 Years Back. 10 Years Ahead (Lecture Notes in Computer Science)
Informatics: 10 Years Back. 10 Years Ahead (Lecture Notes in Computer Science)
From August 27 to 31, 2000, the International Conference and Research Center for Computer Science in Schloss Dagstuhl, Dagstuhl for short, celebrated its 10th anniversary. Since its founding in 1990, the objective of the Center has been to promote world-class research in computer science, support leading-edge continuing education, and promote the...
Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

Micromessaging: Why Great Leadership is Beyond Words
Micromessaging: Why Great Leadership is Beyond Words

Should you sweat the small stuff?

Absolutely, says Stephen Young-especially when it comes to those critical behaviors that can make or break performance. The reason is simple: no matter what you think you're saying, your words, gestures, and tone of voice can actually communicate something entirely different.

...

Txtng: The Gr8 Db8
Txtng: The Gr8 Db8
He combines an extraordinary knowledge of linguistics with a gift for popularizing. TLS. A highly consumable work of pop linguistics. Los Angeles Times Excellent. Crystal presents a compelling argument in favour of texting as a force for linguistic ability. Melissa Katsoulis, The Times

"Reports of the demise of the
...
Lighting Up: The Rise of Social Smoking on College Campuses
Lighting Up: The Rise of Social Smoking on College Campuses
While the past 40 years have seen significant declines in adult smoking, this is not the case among young adults, who have the highest prevalence of smoking of all other age groups. At a time when just about everyone knows that smoking is bad for you, why do so many college students smoke? Is it a short lived phase or do they continue...
Data Mining on Multimedia Data (Lecture Notes in Computer Science)
Data Mining on Multimedia Data (Lecture Notes in Computer Science)

The increasing use of computer technology in many areas of economic, scientific, and social life is resulting in large collections of digital data. The amount of data which is created on and stored in computers is growing from day to day. Electronic database facilities are common everywhere and can now be considered a standard technology....

Introduction to Electrical Circuit Analysis
Introduction to Electrical Circuit Analysis

A concise and original presentation of the fundamentals for ‘new to the subject’ electrical engineers

This book has been written for students on electrical engineering courses who don’t necessarily possess prior knowledge of electrical circuits.  Based on the author’s own teaching experience, it...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy