Subcategories

The Visual Language of Technique: Volume 2 - Heritage and Expectations in Research

Posted By: AvaxGenius
The Visual Language of Technique: Volume 2 - Heritage and Expectations in Research

The Visual Language of Technique: Volume 2 - Heritage and Expectations in Research by Luigi Cocchiarella
English | PDF(Repost),EPUB | 2015 | 178 Pages | ISBN : 331905340X | 15.5 MB

The book is inspired by the second seminar in a cycle connected to the celebrations of the 150th anniversary of the Politecnico di Milano (June 2013). "Working with the Image. Description Processing Prediction" was the motto of this meeting, aiming to point out the role of Visual Language not only in describing reality, but also in supporting the thinking processes in Science (prediction), in Art (invention), in Technical studies (prevision), and in identifying and working on both visible and invisible phenomena.

Cryptography: Cracking Codes (Intelligence and Counterintelligence)

Posted By: tanas.olesya
Cryptography: Cracking Codes (Intelligence and Counterintelligence)


Cryptography: Cracking Codes (Intelligence and Counterintelligence)
by Rob Curley

English | July 15, 2013 | ISBN: 1622750349 | 112 pages | EPUB | 4.20 Mb

A Classical Introduction to Cryptography Exercise Book

Posted By: roxul
A Classical Introduction to Cryptography Exercise Book

Thomas Baigneres, "A Classical Introduction to Cryptography Exercise Book"
English | ISBN: 0387279342 | 2006 | 268 pages | PDF | 8 MB

Cryptology: Classical and Modern with Maplets

Posted By: DZ123
Cryptology: Classical and Modern with Maplets

Richard E. Klima, Neil P. Sigmon, "Cryptology: Classical and Modern with Maplets"
English | 2012 | ISBN: 1439872414 | PDF | pages: 549 | 9.0 mb

Understanding and Applying Cryptography and Data Security

Posted By: DZ123
Understanding and Applying Cryptography and Data Security

Adam J. Elbirt, "Understanding and Applying Cryptography and Data Security"
English | 2009 | ISBN: 1420061607 | PDF | pages: 667 | 2.3 mb

Computation, Cryptography, and Network Security (Repost)

Posted By: step778
Computation, Cryptography, and Network Security (Repost)

Nicholas J. Daras, Michael Th. Rassias, "Computation, Cryptography, and Network Security"
English | 2015 | pages: 754 | ISBN: 3319372637 | PDF | 11,7 mb

The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography

Posted By: roxul
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography

Simon Singh, "The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography"
English | ISBN: 0385495315 | | 416 pages | EPUB | 14 MB

Foundations of Cryptography: Volume 1, Basic Tools

Posted By: tarantoga
Foundations of Cryptography: Volume 1, Basic Tools

Oded Goldreich, "Foundations of Cryptography: Volume 1, Basic Tools"
English | ASIN: B00E3UR7HW, ISBN: 0521791723, 0521035368 | 2001 | AZW3 | 392 pages | 5 MB

Applied Cryptography and Network Securtiy

Posted By: step778
Applied Cryptography and Network Securtiy

Sen Jaydip, "Applied Cryptography and Network Securtiy"
English | 2012 | pages: 388 | ISBN: 9535102184 | PDF | 16,4 mb

Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data

Posted By: First1
Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data

Practical Synthetic Data Generation: Balancing Privacy and the Broad Availability of Data by Khaled El Emam, Lucy Mosquera, Richard Hoptroff
English | May 19th, 2020 | ISBN: 1492072745 | 166 pages | EPUB | 8.27 MB

Building and testing machine learning models requires access to large and diverse data. But where can you find usable datasets without running into privacy issues? This practical book introduces techniques for generating synthetic data—fake data generated from real data—so you can perform secondary analysis to do research, understand customer behaviors, develop new products, or generate new revenue.

Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression

Posted By: AvaxGenius
Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression

Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression by Arkadii Slinko
English | PDF,EPUB | 2020 | 376 Pages | ISBN : 3030440737 | 27 MB

Modern societies are awash with data that needs to be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from unauthorised access, and transmitted over unreliable channels. All of these operations are based on algebra and number theory and can only be properly understood with a good knowledge of these fields. This textbook provides the mathematical tools and applies them to study key aspects of data transmission such as encryption and compression.

The LLL Algorithm: Survey and Applications

Posted By: AvaxGenius
The LLL Algorithm: Survey and Applications

The LLL Algorithm: Survey and Applications by Phong Q. Nguyen
English | PDF | 2010 | 503 Pages | ISBN : 3642022944 | 5.27 MB

From the reviews:
“Tells the history of the LLL algorithm and paper. … this helpful and useful volume is a welcome reference book that covers nearly all applications of lattice reduction.”
[Samuel S. Wagstaff, Jr., Mathematical Reviews, Issue 2011 m]

Introduction to Cryptography with Open-Source Software

Posted By: interes
Introduction to Cryptography with Open-Source Software

Introduction to Cryptography with Open-Source Software by Alasdair McAndrew
English | ISBN: 143982570X | 2012 | 461 pages | PDF | 2 MB

The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet (Parallax: Re-visions of Culture and Society)

Posted By: sasha82
The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet (Parallax: Re-visions of Culture and Society)

The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet (Parallax: Re-visions of Culture and Society) by Shawn James Rosenheim
2020 | ISBN: 1421437155, 0801853311 | English | 282 pages | PDF | 15 MB

Introduction to Modern Cryptography

Posted By: tanas.olesya
Introduction to Modern Cryptography

Introduction to Modern Cryptography by Jonathan Katz
English | November 6, 2014 | ISBN: 1466570261 | 603 pages | PDF | 7.60 Mb