Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there’s no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then […]
In this second edition of his successful book, experienced teacher and author Mark Allen Weiss continues to refine and enhance his innovative approach to algorithms and data structures. Written for the advanced data structures course, this text highlights theoretical topics like abstract data types and the efficiency of algorithms, as well as performance and running […]
Provides a proven approach to algorithms & data structures using the exciting Java programming language as the implementation tool. With Java, the author highlights conceptual topics, focusing on ADTs and the analysis of algorithms for efficiency as well as performance & running time. DLC: Java (Computer program language).
From the Back Cover
Mark Allen […]
The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in […]
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier’s security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier’s […]
Intended as a intermediate text in management science programs, this text explains operations research, emphasizing model formulation and model building as being of equal importance to the interpretation of software output. Winston (Indiana U.) discusses sensitivity analysis, the dual simplex method, network models, integer and nonlinear programming, game theory, probabilistic inventory models, Markov chains, queuing […]
If you’re like most Acrobat users–creative, business, and engineering pros who work with complex electronic documents–you can ill afford to miss a beat in your production workflow. Then again, you can ill afford being left behind when it comes to mastering the newest version of the important tool on your desktop, Adobe Acrobat 7.
With a new plug-in that re-creates the sounds of 11 of the world’s best-known guitar amps, distributed audio processing (which lets you tap into a virtually unlimited number of Macs), new software instruments (including a killer drum machine), and a slew of workflow enhancements, it’s no wonder you’re chomping at the bit to start using […]