Because of its portability and platform-independence, Java is the ideal computer programming language to use when working on graph algorithms and other mathematical programming problems. Collecting some of the most po...
详细信息
ISBN:
(数字)9781584887195
ISBN:
(纸本)9780367390136
Because of its portability and platform-independence, Java is the ideal computer programming language to use when working on graph algorithms and other mathematical programming problems. Collecting some of the most popular graph algorithms and optimization procedures, A Java Library of Graph Algorithms and Optimization provides the source code for
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition features all of the requisite background material on number theory and algorithmic complexity, includes a historical look at the fiel...
ISBN:
(数字)9781420011241
ISBN:
(纸本)9781584886181
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition features all of the requisite background material on number theory and algorithmic complexity, includes a historical look at the field, and offers updated and expanded exercise sets. In addition to updates throughout the text, this edition includes two new chapters on current and future applications that cover topics such as electronic mail, Internet security, protocol layers and SSL, firewalls, client-server model and cookies, network security, wireless security, smart cards, and biometrics. The book also provides additional information on cryptanalysis and primality testing as well as appendices on DES and primitive roots.
Continuing in the bestselling, informative tradition of the first edition, the Handbook of Combinatorial Designs, Second Edition remains the only resource to contain all of the most important results and tables in the...
详细信息
ISBN:
(数字)9781420010541
ISBN:
(纸本)9781584885061
Continuing in the bestselling, informative tradition of the first edition, the Handbook of Combinatorial Designs, Second Edition remains the only resource to contain all of the most important results and tables in the field of combinatorial design. This handbook covers the constructions, properties, and applications of designs as well as existence
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from att...
详细信息
ISBN:
(数字)9781420035087
ISBN:
(纸本)9781584884705
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remain
Although much literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent developments in the area at an accessible level. Acclaimed author Richar...
详细信息
ISBN:
(数字)9781420035247
ISBN:
(纸本)9781584883388
Although much literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent developments in the area at an accessible level. Acclaimed author Richard A. Mollin brings together all of the relevant information available on public-key cryptography (PKC), from RSA to the latest applic
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for informat...
ISBN:
(纸本)9780849385230
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography."The Handbook of Applied Cryptography" provides a treatment that is multifunctional. It serves as an introduction to the more practical aspects of both conventional and public-key cryptography. It is a valuable source of the latest techniques and algorithms for the serious practitioner. It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit. It provides a mathematical treatment to accompany practical discussions. It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed. Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.
暂无评论