Carlos Mendes | Tanaka-kun wa Itsumo Kedaruge | Phresher-PH-WEB-2018-ENRAGED
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
A Primer for Mathematics Competitions
A Primer for Mathematics Competitions
The importance of mathematics competitions has been widely recognized for three reasons: they help to develop imaginative capacity and thinking skills whose value far transcends mathematics; they constitute the most effective way of discovering and nurturing mathematical talent; and they provide a means to combat the prevalent false image of...
Linux Administration Handbook (2nd Edition)
Linux Administration Handbook (2nd Edition)
As the deployment of Linux systems in production environments has accelerated, Linux administrators have longed for a book that addresses the challenges of this complex and exciting frontier. Linux Administration Handbook was written with this audience in mind. This book serves both as a valuable tutorial for the novice administrator and as a...
Refactoring to Patterns (The Addison-Wesley Signature Series)
Refactoring to Patterns (The Addison-Wesley Signature Series)

In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns, Joshua...

The Right Decision: A Mathematician Reveals How the Secrets of Decision Theory
The Right Decision: A Mathematician Reveals How the Secrets of Decision Theory

CAN YOU EVER BE SURE YOU'RE MAKING THE RIGHT DECISION?

Should you stay in a comfy job with little chance of advancement-or take a riskier one in which you could make lots of money but also wind up on the street?

Should you listen to a doctor who advises surgery-or trust another who tells you to wait and see if...

Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Liars and Outliers: Enabling the Trust that Society Needs to Thrive

Just today, a stranger came to my door claiming he was here to unclog a bathroom drain. I let him into my house without verifying his identity, and not only did he repair the drain, he also took off his shoes so he wouldn’t track mud on my floors. When he was done, I gave him a piece of paper that asked my bank to give him some money....

Unmasking the Social Engineer: The Human Element of Security
Unmasking the Social Engineer: The Human Element of Security

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and...

The Professional Scrum Master's Handbook (Professional Expertise Distilled)
The Professional Scrum Master's Handbook (Professional Expertise Distilled)

Key Features

  • Checklists, questions, and exercises to get you thinking (and acting) like a professional ScrumMaster
  • Presented in a relaxed, jargon-free, personable style
  • Full of ideas, tips, and anecdotes based on real-world experiences

Book Description

A...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Do the Math: Secrets, Lies, and Algebra
Do the Math: Secrets, Lies, and Algebra

Tess loves math because it's the one subject she can trust—there's always just one right answer, and it never changes. But then she starts algebra and is introduced to those pesky and mysterious variables, which seem to be everywhere in eighth grade. When even your friends and parents can be variables, how in the world do...

Technologies for the Wireless Future: Wireless World Research Forum (WWRF)
Technologies for the Wireless Future: Wireless World Research Forum (WWRF)
As 3G mobile communication systems are being deployed, the research community is now focusing on the research needed for the long-term evolution of 3G and 4G systems. This fully updated second volume of the successful Technologies for the Wireless Future is a unique and timely book, presenting up-to-the-minute ideas and trends in mobile...
Result Page: 31 30 29 28 27 26 25 24 23 22 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy