Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

C++ The Core Language (Nutshell Handbooks)
C++ The Core Language (Nutshell Handbooks)

C++ is an object-oriented enhancement of the C programming language and is becoming the language of choice for serious software development.C++ has crossed the Single Book Complexity Barrier. The individual features are not all that complex, but when put together in a program they interact in highly non-intuitive ways. Many books discuss each...

Mysticism in the World's Religions
Mysticism in the World's Religions
This wide-ranging book covers all the major religious traditions, while exploring monistic and theistic mysticism, and such key issues as altered states of consciousness, sex, and visionary experiences.

There is a widespread modem interest in religious affairs in the broadest sense, from Hare Krishna to the Jesus People and from
...
Metaclasses and Their Application: Data Model Tailoring and Database Integration (Lecture Notes in Computer Science)
Metaclasses and Their Application: Data Model Tailoring and Database Integration (Lecture Notes in Computer Science)

Conventional object-oriented data models are "closed". Although they allow users to define application-specific classes, they usually come with a fixed set of modeling primitives. This constitutes a major problem as different application domains have different requirements on a data model. For example, database integration...

Randomized Algorithms
Randomized Algorithms
For many applications, a randomized algorithm is either the simplest or the fastest algorithm available, and sometimes both. This book introduces the basic concepts in the design and analysis of randomized algorithms. The first part of the text presents basic tools such as probability theory and probabilistic analysis that are frequently used in...
SAS Programming by Example
SAS Programming by Example
Develop and fine-tune your programming skills the easy way - by example! For beginning and intermediate users, SAS Programming by Example guides you, with a series of annotated examples, through basic tasks to more complex ones. Problems and solutions are provided to make the most of the programming tools available in base SAS software....
Biochemistry and Molecular Biology of Parasites
Biochemistry and Molecular Biology of Parasites

The study of parasitic organisms at the molecular level has yielded fascinating new insights of great medical, social, and economical importance, and has pointed the way for the treatment and prevention of the diseases they cause. Biochemistry and Molecular Biology of Parasites presents an up-to-date account of this modern scientific...

Optoelectronics for Data Communication
Optoelectronics for Data Communication
The use of optoelectronics for data communication is becoming increasingly important in the 1990s. Much of the base technology needed for this field was developed by the telecommunications industry, but there are important differences that are covered in this text.

This is the first book to focus on the critical technology and
...
Writing bug-free C code for Windows: a programming style that automatically detects bugs in C code
Writing bug-free C code for Windows: a programming style that automatically detects bugs in C code
This book describes an alternate class methodology that provides complete data hiding and fault-tolerant run-time type checking of objects in C programs. With it, you will produce code that contains fewer bugs.

The class methodology helps to prevent bugs by making it easier to write C code. It does this by eliminating data
...
Encyclopedia of the Persian Gulf War
Encyclopedia of the Persian Gulf War
Because the 1991 War for Kuwait (erroneously dubbed the Gulf War) ended too quickly, it will probably never receive the scholarly attention that other conflicts garner. The politics of the Gulf is too complex, perhaps even too foreign, for most observers, and the reasons for our intervention too pragmatic to deserve the kind of attention that...
Active Visual Inference of Surface Shape (Lecture Notes in Computer Science)
Active Visual Inference of Surface Shape (Lecture Notes in Computer Science)
This monograph is devoted to the problem of inferring geometric information about arbitrarily curved surfaces from visual cues; this is a central problem in computer vision with immediate relevance for robot manipulation and navigation. The author develops computational theories and techniques relating visual information arising from viewer...
Network Programming in Windows NT
Network Programming in Windows NT

Sinha explains the use of Windows and Windows NT inter-process communication methods to build applications which can communicate with their counterparts over the network. This book explores the challenges that developers face when they are developing network-aware or client/server programs within the Windows and Windows NT operating systems.

...
unlimited object storage image
Result Page: Previous 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy