Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Intended for a graduate-level course in Cryptographic Engineering, this text will teach students with a basic knowledge of computer cryptograms how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.
Bemærk: Kan ikke leveres før jul.
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market... Læs mere
Bemærk: Kan ikke leveres før jul.
The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P).
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The 7th Annual Working Conference of ISMSSS (lnformation Security... Læs mere
Bemærk: Kan ikke leveres før jul.
Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management.
Bemærk: Kan ikke leveres før jul.
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.
Bemærk: Kan ikke leveres før jul.
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road.
Bemærk: Kan ikke leveres før jul.
"Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future"--Back cover.
Bemærk: Kan ikke leveres før jul.
This book is one of the first to cover SAT-solvers and how they can be used in cryptanalysis. It includes chapters on finite field linear algebra and the equicomplexity of matrix operations.