Understanding Cryptography: A Textbook for Students and Practitioners
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...
TCP/IP Protocol Suite (Mcgraw-hill Forouzan Networking)
In a world where the number of people who need to learn about data communications and networking is exploding, Forouzan's book is the answer. The book's visual approach makes it easy for students to learn about and understand the concepts involved in this rapidly developing field.
TCP/IP Protocol Suite teaches students and...
Numerical Methods in Engineering with MATLAB
The second edition was largely precipitated by the introduction of anonymous functions into MATLAB. This feature, which allows us to embed functions in a program, rather than storing them in separate files, helps to alleviate the scourge of MATLAB programmers – proliferation of small files. In this edition, we have recoded all the...
Moments and Moment Invariants in Pattern Recognition
Automatic object recognition has become an established discipline in image analysis. Moments and moment invariants play a very important role as features in invariant recognition. They were introduced to the pattern recognition community almost 50 years ago and the mathematical background they utilized is even older, originating from the...
The Foundations of Signal Integrity
The first book to focus on the electromagnetic basis of signal integrity
The Foundations of Signal Integrity is the first of its kind—a reference that examines the physical foundation of system integrity based on electromagnetic theory derived from Maxwell's Equations. Drawing upon the cutting-edge...
Algebraic Geometry in Coding Theory and Cryptography
Algebraic geometry has found fascinating applications to coding theory
and cryptography in the last few decades. This book aims to provide the
necessary theoretical background for reading the contemporary literature on
these applications. An aspect that we emphasize, as it is very useful for
the applications, is the interplay between...
|Result Page: Previous 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Next |