Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Quantum Attacks on Public-Key Cryptosystems
Quantum Attacks on Public-Key Cryptosystems

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no...

Microsoft System Center Cloud Management with App Controller (Introducing)
Microsoft System Center Cloud Management with App Controller (Introducing)

Part of a series of specialized guides on System Center - this book focuses on using AppController to manage virtual machines and services across private and public clouds. Series editor Mitch Tulloch and a team of System Center experts provide concise technical guidance as they step you through key configuration and management tasks.

...
CCNA Data Center - Introducing Cisco Data Center Networking Study Guide: Exam 640-911
CCNA Data Center - Introducing Cisco Data Center Networking Study Guide: Exam 640-911

A must-have study guide for exam 640-911 on Cisco's UnifiedData Center

The Cisco Certified Network Associate Data Center certificationis Cisco's newest certification, covering the Cisco Unified DataCenter technologies. Written by unparalleled author and Ciscoauthority Todd Lammle, and CCIE John Swartz, this...

Robot Framework Test Automation
Robot Framework Test Automation

Create test suites and automated acceptance tests from scratch

Overview

  • Create a Robot Framework test file and a test suite
  • Identify and differentiate between different test case writing styles
  • Full of easy- to- follow steps, to get you started with Robot Framework
  • ...
SharePoint 2013 For Dummies (Computer/Tech)
SharePoint 2013 For Dummies (Computer/Tech)

The bestselling guide on running SharePoint, now updated to cover all the new features of SharePoint 2013

SharePoint Portal Server is an essential part of the enterprise infrastructure for many businesses. Building on the success of previous versions of SharePoint For Dummies, this new edition covers all the latest...

Transactions on Pattern Languages of Programming III (Lecture Notes in Computer Science)
Transactions on Pattern Languages of Programming III (Lecture Notes in Computer Science)

The Transactions on Pattern Languages of Programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the software life cycle, from requirements and design to implementation, maintenance and evolution. The primary focus of this LNCS Transactions...

DOM Enlightenment
DOM Enlightenment

With DOM Enlightenment, you’ll learn how to manipulate HTML more efficiently by scripting the Document Object Model (DOM) without a DOM library. Using code examples in cookbook style, author Cody Lindley (jQuery Cookbook) walks you through modern DOM concepts to demonstrate how various node objects work.

...

Quantitative Remote Sensing in Thermal Infrared: Theory and Applications (Springer Remote Sensing/Photogrammetry)
Quantitative Remote Sensing in Thermal Infrared: Theory and Applications (Springer Remote Sensing/Photogrammetry)
Remote sensing, by definition, is the acquisition of information about objects or events without making physical contact. In the broad usage, remote sensing refers to the use of both the force fields (such as gravity and magnetism) and electromagnetic spectrum to detect, classify, and identify the objects or events. In the...
Transactions on Petri Nets and Other Models of Concurrency VIII (Lecture Notes in Computer Science)
Transactions on Petri Nets and Other Models of Concurrency VIII (Lecture Notes in Computer Science)

The 8th volume of ToPNoC contains revised and extended versions of a selection of the best workshop papers presented at the 33rd International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (Petri Nets 2012). The 10 papers cover a diverse range of topics including model checking and system verification,...

Solar Energy Engineering, Second Edition: Processes and Systems
Solar Energy Engineering, Second Edition: Processes and Systems

Energy policy promoting sustainable development is transforming global energy markets. Solar power, the most abundant of all renewable resources, is crucial to greater achieving energy security and sustainability. This new edition of Solar Energy Engineering: Processes and Systems from Prof. Soteris Kalogirou, a renowned expert...

Animation (Portfolio)
Animation (Portfolio)

From scriptwriting through to production, this introduction to animation for students surveys key technical processes and examines a variety of stylistic approaches. The book includes visual examples from key animators and illustrated features on how to create exciting animation for a variety of audiences.

This book is a vital...

The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In
...

Result Page: Previous 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy