Cryptography
epub |eng | 2020-05-18 | Author:Keith Martin [Martin, Keith]
How to Save the World Here’s cryptography in action, as often witnessed on television dramas (and the likes of James Bond movies). Two intelligence agents sit tensely in a car, ...
( Category:
Cryptography
May 19,2020 )
epub |eng | 2020-03-10 | Author:Knight, Alissa [Knight, Alissa]
When You Don't Know the IMSI or MSISDN of the TCU When you find yourself in the precarious position of a black box or gray box penetration test, or even ...
( Category:
Cryptography
April 10,2020 )
epub |eng | 2019-04-30 | Author:Xun (Brian) Wu [Xun (Brian) Wu]
The SDK is installed at /usr/lib/python3/dist-packages/sawtooth_sdk. How to do it... Let's go through a step-by-step guide to implement a transaction processor. We will highlight the important code segments to explain ...
( Category:
Cryptography
April 5,2020 )
epub |eng | 2019-09-20 | Author:Xun (Brian) Wu [Xun (Brian) Wu]
We were able to create the art token and list the art in the art market. Next, we will implement the buyer functions. Implementing the buyArt() function The users can ...
( Category:
Software Development
March 28,2020 )
epub |eng | 2019-11-26 | Author:Roger A. Grimes
Quantum Marketing Many of the best technological inventions of our time were largely driven and funded by advertising and marketing. Radio, television, and cable TV were driven by advertising. The ...
( Category:
Cryptography
March 21,2020 )
epub |eng | 2018-09-24 | Author:Samuel Bowne
( Category:
Cryptography
March 14,2020 )
epub |eng | | Author:Yanofsky, Noson S.; Mannucci, Mirco A.
Figure 6.7. The action of DFT†. [P(ω0), P(ω1), P(ω2),…, P(ωk),…, P(ωM−1)]T is the vector of the values of the polynomial at the powers of the Mth root of unity. Let ...
( Category:
Cryptography
March 10,2020 )
mobi, epub |eng | 2020-02-24 | Author:Dr. Chase Cunningham
( Category:
Cryptography
March 2,2020 )
epub |eng | 2019-01-18 | Author:Maximiliano Santos
Food safety regulations – ISO 22000 As a result of globalization, many kinds of food come and go from different countries. There are a lot of serious consequences that can ...
( Category:
Expert Systems
November 29,2019 )
epub |eng | 2019-03-22 | Author:Nitin Gaur
Participants are agents Our examination of participant types shows us that they all have one thing in common—they have a significant degrees of agency—they actively do things. Although systems and ...
( Category:
Cryptography
November 29,2019 )
mobi, azw3, epub |eng | 2011-01-25 | Author:Singh, Simon [Singh, Simon]
5 The Language Barrier While British codebreakers were breaking the German Enigma cipher and altering the course of the war in Europe, American codebreakers were having an equally important influence ...
( Category:
Cryptography
March 25,2014 )
Categories
Popular ebooks
Learn Ethereum by Xun (Brian) Wu(1400)Hands-On Cryptography with Python by Samuel Bowne(1336)
Hyperledger Cookbook by Xun (Brian) Wu(1309)
Hands-On IoT Solutions with Blockchain by Maximiliano Santos(1084)
Hands-On Blockchain with Hyperledger by Nitin Gaur(964)
Cryptography: The Key to Digital Security, How It Works, and Why It Matters by Keith Martin(643)
Cryptography by Keith Martin(607)
Hacking Connected Cars : Tactics, Techniques, and Procedures (9781119491736) by Knight Alissa(517)
Simple Steps to Data Encryption by Loshin Peter(492)
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Singh Simon(418)
Foundations of Cryptography: Volume 1, Basic Tools by Oded Goldreich(400)
Tribe of Hackers Security Leaders by Marcus J. Carey & Jennifer Jin(366)
Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham(340)
Quantum Computing for Computer Scientists (9781139634120) by Yanofsky Noson S.; Mannucci Mirco A(308)
Cryptography Apocalypse by Roger A. Grimes(284)
Practical OPNsense: Building Enterprise Firewalls With Open Source by Markus Stubbig(181)
Malware Analyst's Cookbook: Tools and Techniques for Fighting Malicious Code by Ligh Michael & Adair Steven & Hartstein Blake & Richard Matthew(126)
Cybersecurity ABCs by Jessica Barker(118)
Database and Application Security by R. Sarma Danturthi;(113)
CISO Desk Reference Guide Executive Primer by Bonney Hayslip Stamper(100)
