Kết quả tìm kiếm
Có 82408 kết quả được tìm thấy
14511Cryptocurrency investing

Sometimes used as another term for dust jacket, a protective and often decorative wrapper, usually made of paper which wraps around the binding of a book

14512Cryptography and network security

Part 1: Conventioanal encryption; Part 2: Public key encryption and hash functions; Part 3: Network security practice; Part 4: System security.

14513Cryptography and network security : 7th ed.

Part 1: Background; Part 2: Symmetric ciphers; Part 3: Asymmetric ciphers; Part 4: Cryptographic data integrity. Part 5: Mutual trust; Part 6: Network and internet security.

14514Cryptography and network security : principles and practice

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.

14515Cryptography and network security : principles and practice : 4th ed.

This book provieds a practical survey of both the principles and practice of Cryptography and Network Security. In the first two parts of the book, the basic issue to be addressed by a network security technology. The later part of the the book deals with practice of network security. This book presents not only the basic mathematical results that are needed but provides the reader with an intuitive understanding of those results.

14516Cryptography and network security : principles and practice : 7th ed.

The seventh edition streamlines subject matter with new and updated material — including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, the reader learns a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for the reader to ensure a successful learning experience.

14517Cryptography and network security : principles and practice : 7th ed.

The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security.

14518Cryptography decrypted

Contents: I. Secret key cryptography. II. Public key cryptography. III. Distribution of public keys. IV. Real-world systems.

14519CSS pocket reference : 4th ed.

This handy, concise book provides all of the essential information you need to implement CSS on the fly. Ideal for intermediate to advanced web designers and developers, the 4th edition is revised and updated for CSS3, the latest version of the cascading style sheet specification.

14520CSS3 : the missing manualt: 3rd edition

The book has the following 5 part: Part 1. CSS Basics; Part 2. Applied CSS; Part 3. CSS page layout; Part 4. Advanced CSS; Part 5. Appendixes.