Post Quantum Cryptography Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... Music Composition For Dummies
Creative exercises build your composing skills
The fun and easy way to turn the tune in your head into a full-fledged composition!
Wish you could write music? You can! This friendly guide gives you everything you need to start composing, from choosing the right rhythm and tempo to...
OAuth 2.0 Identity and Access Management Patterns
Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.
Build web, client-side, desktop, and server-side...
Walk Like a Giant, Sell Like a Madman
As last years best-selling realtor in America, Ralph R. Roberts didn't just outperform his peers, he blew them away. While the average realtor sells seven homes per year, Roberts sold more than 500! Roberts' high-energy, infectious enthusiasm for selling is legendary and has earned him well-deserved national recognition; he has been...
Mobile WiMAX (Wiley - IEE)
With the wide and rapid deployment of wireless LANs technology, WiMAX is an emerging technology in wireless communication and is one of the hottest subjects in wireless communications.
Mobile WiMAX is based on selected papers and plenary speeches from the 2007 IEEE Mobile WiMAX Symposium, this book provides...
|Result Page: 5 4 3 2 1 |