Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Foundations of Cryptography: Volume 1, Basic Tools (Vol 1)
Foundations of Cryptography: Volume 1, Basic Tools (Vol 1)

Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical...

Roitt's Essential Immunology, Tenth Edition (Essentials)
Roitt's Essential Immunology, Tenth Edition (Essentials)

Roitt's Essential Immunology has established itself as the book of choice for students of immunology worldwide. This excellent textbook is commonly regarded as 'the best of the immunology primers' and the tenth edition remains at the cutting edge of this fascinating area of science.

The trademark of this book is...

Hypertension Secrets, 1e
Hypertension Secrets, 1e

All the very latest clinical information on hypertension is covered in this practical addition to the popular Secrets Series®. Coverage includes Patient Assessment, Essential Hypertension, Secondary Hypertension, and Special Cases of Hypertension and focuses extensively on all current drugs and therapies.

Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
For at least two thousand years there have been people who wanted to
send messages which could only be read by the people for whom they
were intended. When a message is sent by hand, carried from the sender
to the recipient, whether by a slave, as in ancient Greece or Rome, or by
the Post Office today, there is a risk of it
...
Programming Python, Second Edition with CD
Programming Python, Second Edition with CD
Programming Python focuses on advanced applications of Python. Endorsed by Python creator Guido van Rossum, it demonstrates advanced Python techniques, and addresses software design issues such as reusability and object-oriented programming. The enclosed platform-neutral CD-ROM has book examples and various...
Genetic Toxicology and Cancer Risk Assessment
Genetic Toxicology and Cancer Risk Assessment

Presents state-of-the-art regulatory cancer risk assessment models including a biologically based model for two-hit carcinogenesis and cell proliferation!

This book comprehensively reviews the various roles of genetic toxicology in human cancer risk assessment conducted by United States and worldwide regulatory
...

Handbook of Optical Coherence Tomography
Handbook of Optical Coherence Tomography

This contemporary reference presents a comprehensive review of the most recent applications of optical coherence tomography (OCT) in biology, medicine, engineering, and applied physics-summarizing technological advances that led to the availability of viable imaging tools and modern methods of OCT for optical biopsy, surgical guidance, and...

Secure Communicating Systems: Design, Analysis, and Implementation
Secure Communicating Systems: Design, Analysis, and Implementation
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical...
Fundamentals of RF Circuit Design: with Low Noise Oscillators
Fundamentals of RF Circuit Design: with Low Noise Oscillators

The art of RF circuit design made simple.....

Radio Frequency circuits are the fundamental building blocks in a vast array of consumer electronics and wireless communication devices. Jeremy Everard's unique combination of theory and practice provides insight into the principles of operation, together with invaluable guidance to...

PPP Design, Implementation, and Debugging (2nd Edition)
PPP Design, Implementation, and Debugging (2nd Edition)
Extensively revised and expanded to cover the latest developments in PPP and network technology, this second edition addresses such current topics as:
  • PPP in today's telecommunications infrastructure
  • PPP and telephony
  • Optical (SONET/SDH) PPP links
  • The relationship between PPP and...
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the...
ASP.NET by Example
ASP.NET by Example
ASP developers need to understand how ASP.NET can help them solve business problems better than any prior product. ASP.NET by Example is designed to provide a "crash course" on ASP.NET and quickly help the reader start using this new technology. As part of the By Example series, this book approaches ASP.NET in an easy-to-use tutorial...
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy