Meri Nimmo | TheVideo | Raft v1 01b
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Think Data Structures: Algorithms and Information Retrieval in Java
Think Data Structures: Algorithms and Information Retrieval in Java

If you’re a student studying computer science or a software developer preparing for technical interviews, this practical book will help you learn and review some of the most important ideas in software engineering—data structures and algorithms—in a way that’s clearer, more concise, and more engaging than...

Advanced Data Structures
Advanced Data Structures
Advanced Data Structures presents a comprehensive look at the ideas, analysis, and implementation details of data structures as a specialized topic in applied algorithms. Data structures are how data is stored within a computer, and how one can go about searching for data within. This text examines efficient ways to search and update sets of...
Introduction to 64 Bit Intel Assembly Language Programming for Linux
Introduction to 64 Bit Intel Assembly Language Programming for Linux
The Intel CPU architecture has evolved over 3 decades from a 1 6 bit CPU with no memory protection, through a period with 32 bit processors with sophisticated architectures into the current series of processors which support all the old modes of operation in addition to a greatly expanded 64 bit mode of operation. Assembly...
Optimizing C ++
Optimizing C ++
Written in an exceptionally clear style that doesn't skimp on technical detail, Steve Heller's guide offers several high-performance search and data-compression algorithms, which are all you need to add speed to C++. Early sections of the book address the advantages of optimizing C++, which the author considers something of a lost art. Instead of...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)
Data Storage for Social Networks: A Socially Aware Approach (SpringerBriefs in Optimization)

Evidenced by the success of Facebook, Twitter, and LinkedIn, online social networks (OSNs) have become ubiquitous, offering novel ways for people to access information and communicate with each other. As the increasing popularity of social networking is undeniable, scalability is an important issue for any OSN that wants to serve a large...

Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Modern Cryptography Primer: Theoretical Foundations and Practical Applications

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...

Database Management Systems
Database Management Systems
DATABASE MANAGEMENT SYSTEMS is designed for use in a course in databases. This book is distinctive in its emphasis on the practical side of databases. This means that it has unique coverage of database design, uses SQL throughout the book to demonstrate different concepts, and has an emphasis on query evaluation and optimization. In this revision...
Beyond Buds: Marijuana Extracts—Hash, Vaping, Dabbing, Edibles and Medicines
Beyond Buds: Marijuana Extracts—Hash, Vaping, Dabbing, Edibles and Medicines
Beyond Buds is a handbook to the future of marijuana. Prohibition’s end has led to a technological revolution that’s generated powerful medicines and products containing almost zero carcinogens and little smoke. Marijuana icon Ed Rosenthal and leading cannabis reporter David Downs guide readers through the best new...
Result Page: 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy