Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there’s no better...
In this second edition of his successful book, experienced teacher and author Mark Allen Weiss continues to refine and enhance his innovative approach to algorithms and data structures. Written for the advanced data structures course, this text highlights theoretical...
Provides a proven approach to algorithms & data structures using the exciting Java programming language as the implementation tool. With Java, the author highlights conceptual topics, focusing on ADTs and the analysis of algorithms for efficiency as well as...
The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus...
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for...
Intended as a intermediate text in management science programs, this text explains operations research, emphasizing model formulation and model building as being of equal importance to the interpretation of software output. Winston (Indiana U.) discusses sensitivity...
If you’re like most Acrobat users–creative, business, and engineering pros who work with complex electronic documents–you can ill afford to miss a beat in your production workflow. Then again, you can ill afford being left behind when it comes to...
With a new plug-in that re-creates the sounds of 11 of the world’s best-known guitar amps, distributed audio processing (which lets you tap into a virtually unlimited number of Macs), new software instruments (including a killer drum machine), and a slew of...
Get expert design guidance and fully functional sample databases from John L. Viescas? popular author, consultant, and Microsoft Most Valuable Professional (MVP) for Access. Designed for everyone from Access power users to application developers to beginners, this...
Intended for professional writers and Unix programmers, this guide explains how to use the GNU Emacs text editor to format and correct text in a file, boost productivity with multiple buffers and windows, give commands without leaving the editor, and take advantage of...