Listing 1 - 10 of 781 | << page >> |
Sort by
|
Choose an application
Choose an application
Writing --- cryptologie
Choose an application
Samenvatting:Designed for either the intelligent freshman (good at math) or for alow-level junior year first course, Cryptology introduces a wide range ofup-to-date cryptological concepts along with the mathematical ideas thatare behind them. The new and old are organized around a historicalframework. A variety of mathematical topics that are germane tocryptology (e.g., modular arithmetic, Boolean functions, complexitytheory, etc.) are developed, but they do not overshadow the main focus ofthe text. Unlike other texts in this field, Cryptology brings studentsdirectly to concepts of classical substitutions and transpositions andissues in modern cryptographic methods.
Beveiliging. --- Cryptografie. --- Cryptologie.
Choose an application
Choose an application
Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular representation of group elements. This is modeled by treating the group as a black-box. The fact that a computational problem cannot be solved by a reasonably restricted class of algorithms may be seen as support towards the conjecture that the problem is also hard in the classical Turing machine model. Moreover, a lower complexity bound for certain algorithms is a helpful insight for the search for cryptanalytic algorithms. Tibor Jager addresses several fundamental questions concerning algebraic black-box models of computation: Are the generic group model and its variants a reasonable abstraction? What are the limitations of these models? Can we relax these models to bring them closer to the reality?
Computer. Automation --- cryptologie --- informatica --- wiskunde
Choose an application
Computer. Automation --- cryptologie --- informatica --- wiskunde
Choose an application
Compressing data is an option naturally selected when faced with problems of high costs or restricted space. Written by a renowned expert in the field, this book offers readers a succinct, reader-friendly foundation to the chief approaches, methods and techniques currently employed in the field of data compression. Part I presents the basic approaches to data compression and describes a few popular techniques and methods commonly used to compress data. The reader discovers essential concepts, such as variable-length and prefix codes, statistical distributions and run-length encoding. Part II then concentrates on advanced techniques, such as arithmetic coding, orthogonal transforms, subband transforms and the Burrows-Wheeler transform. Features: ¢ Clear overview of the principles underlying this field ¢ Outlines the essentials of the various approaches to compressing data ¢ Contains many learning aids such as: chapter introductions and summaries, chapter-end exercises, comprehensive glossary, etc. ¢ Provides several examples of important compression algorithms ¢ Offers a supplementary author-maintained website, with errata and auxiliary material - www.davidsalomon.name/DCugAdvertis/DCug.html ¢ An ideal introductory volume to David Salomon's fourth edition of Data Compression: The Complete Reference Complete and clear, this book is the perfect resource for undergraduates in computer science and requires a minimum of mathematics. It is also ideal for readers with a basic knowledge of computer science wanting to learn about data compression. David Salomon is a professor emeritus of Computer Science at California State University, Northridge. He has authored numerous articles and books, including Coding for Data and Computer Communications, Guide to Data Compression Methods, Data Privacy and Security, Computer Graphics and Geometric Modeling, Foundations of Computer Security, Transformations and Projections in Computer Graphics, and Variable-length Codes for Data Compression.
Computer science --- Information systems --- cryptologie --- programmatielogica
Choose an application
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Identity Management, Information Security Management - PKI-Solutions, Economics of IT-Security - Smart Tokens, eID Cards, Infrastructure Solutions - Critical Information Infrastructure Protection, Data Protection, Legal Aspects. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE/SECURE 2007.
Computer science --- Information systems --- cryptologie --- programmatielogica
Choose an application
Companies of all sizes worldwide are looking to virtualization to change the way data centers operate. Server consolidation, energy efficiency, simpler management, and deployment and increased capacity are all tangible benefits to be gained from a move to virtual servers and virtually hosted services. Microsoft has introduced Hyper-V, a Hypervisor-based virtualization platform integrated with the operating system, allowing you to dynamically add physical and virtual resources into your data center with minimal pain. In Pro Hyper-V, author Harley Stagner takes a comprehensive approach to acquiring, deploying, using, and troubleshooting Microsoft's answer to virtualization on the Windows Server platform. Learn from a true virtualization guru all you need to know about deploying virtual machines, managing your library of VMs in your enterprise, recovering gracefully from failure scenarios, and migrating existing physical machines to virtual hardware.
Computer science --- Information systems --- cryptologie --- programmatielogica
Choose an application
The Oracle database engine has become a huge piece of software. This not only means that a single human can no longer be proficient in using all the features provided in recent versions, but it also means that some of them will rarely be used. Actually, in most situations, it is enough to know and take advantage of a limited number of core features in order to use the Oracle da- base engine efficiently and successfully. This is precisely why in this book I will cover only the features that, based on my experience, are necessary to troubleshoot most of the databa- related performance problems you will encounter. Structure of This Book This book is divided into five parts: Part 1 covers some basics that are required to read the rest of the book. Chapter 1, Perf- mance Problems, explains not only why it is essential to approach performance problems at the right moment and in a methodological way but also why understanding business needs and problems is essential. Chapter 2, Key Concepts, describes the operations carried out by the database engine when parsing and executing SQL statements. It also introduces some terms that are frequently used in the book. Part 2 explains how to approach performance problems in an environment that is based on the Oracle database engine. Chapter 3, Identifying Performance Problems, provides a detailed analysis road map for identifying performance problems. Several tools and te- niques that can be used with it are also described.
Computer science --- Information systems --- cryptologie --- programmatielogica
Listing 1 - 10 of 781 | << page >> |
Sort by
|