Showing 1561–1584 of 1605 results
Diagnose, fix, upgrade, and maintain your PC and install software and peripherals with help from this easy-to-use guide. Inside, you’ll find just what the PC Doctor ordered with the fix-it-yourself PC home remedies you need to take good care of your computer. Learn how to interpret error messages, troubleshoot common problems, and resolve performance issues. Plus, get handy checklists at the end of each chapter to help you with ongoing maintenance. This step-by-step resource empowers you with the knowledge and skills you need to keep your PC running smoothly.
Get expert advice on where to find more information to help yourself
Adrian Kingsley-Hughes is a technical director and consultant for a U.K.-based computer company. He teaches many PC-related courses, including one entitled “Caring for Your PC.” He has taught many thousands of people to fix their PC problems for themselves, and this inspired him to write this book.
This bestselling on-the-job reference and test preparation guide has been fully revised for the new 2015 CompTIA A+ exam objectives
Written by the leading authority on CompTIA A+ certification and training, this self-study book and CD has been thoroughly updated to cover 100% of the exam objectives on the 2015 CompTIA A+ exams. New topics include managing and maintaining cellular devices, including tablets; configuring operating systems, including Windows 8, Android, and iOS; and enhanced, mobile-centered security and troubleshooting procedures.
CompTIA A+® Certification All-in-One Exam Guide, Ninth Edition (Exams 220-901 & 220-902) enables you to take the test with complete confidence. It also serves as a practical reference for IT support and technical personnel.
Key FeaturesBuild, set up, and develop your circuits via step-by-step tutorial of practical examples, from initial board setup to device driver managementGet access to several kinds of computer peripherals to monitor and control your domestic environment using this guideThis book is spread across 10 chapters all focused on one practical home automation projectBook DescriptionBeagleBone is a microboard PC that runs Linux. It can connect to the Internet and can run OSes such as Android and Ubuntu.
Learn to navigate the iPhone like a pro Learning to use new technology can be a bit of a challenge for seniors, especially now that smartphones are more like mobile computers. iPhone For Seniors For Dummies, 5th Edition is a full-color text that guides you through easy-to-understand lessons in iPhone features and functions. This step-by-step reference explains how to use the most basic of your phone’s capabilities, such as making calls and sending text messages. Additionally, this newly revised book walks you through the most exciting features of your iPhone’s hardware and software, from downloading new apps to keeping your data—and your phone—safe.
Welcome to the only guidebook series that takes a visual approach to professional–level computer topics. Open the book and you′ll discover step–by–step screen shots that demonstrate over 140 key Excel programming techniques, including: Assigning digital signatures to macros Setting properties for a project Assigning values to a variable Changing the properties of an object
This interdisciplinary book gives a comprehensive survey of the state-of-the-art: from applications and trends in fluorescence techniques in science to medicine and engineering. Written for practitioners and researchers in industry and academia, it covers fields like environmental and materials science, biology, medicine, physics and chemistry. Moreover, it reports on such new and breathtaking methods as ultra-fast time-resolved or single molecule spectroscopy, gives examples of applications in the fields of electroluminescent polymers, visualization of membrane potentials in neurons and fluorescence imaging of the brain.
Event-based systems are a class of reactive systems deployed in a wide spectrum of engineering disciplines including control, communication, signal processing, and electronic instrumentation. Activities in event-based systems are triggered in response to events usually representing a significant change of the state of controlled or monitored physical variables. Event-based systems adopt a model of calls for resources only if it is necessary, and therefore, they are characterized by efficient utilization of communication bandwidth, computation capability, and energy budget.
Book of computer-based exercises using MATLAB fills a need in the Signals and Systems market for a comprehensive set of computer exercises for use in an undergraduate course on signals and systems. Various levels of difficult cover the fundamentals. In addition to being a companion to Signals and Systems by Oppenheim & Willsky with Nawab, the book stands alone and is suitable for use in most introductory courses in signals and systems.
Die Autoren führen in die Kryptographie aus Sicht der Informatik und Mathematik ein. Kryptographie wird als wichtiger Schutzmechanismus zur Gewährleistung von Vertraulichkeit und Integrität im elektronischen Datenverkehr vorgestellt. Wesentliche Themen sind Bedrohungen, korrespondierende Schutzziele und Angreifermodelle. Die grundlegenden Typen kryptographischer Systeme zur Durchsetzung der Schutzziele werden eingeführt und konkrete Verfahren beschrieben. Dabei werden relevante Angriffe, Verbesserungsmöglichkeiten und Grenzen kryptographischer Systeme aufgezeigt.
Cryptography is an outstanding book that covers all the major areas of cryptography in a readable, mathematically precise form. Several chapters deal with especially active areas of research and give the reader a quick introduction and overview of the basic results in the area.
These are the proceedings of CHES 2003, the ?fth workshop on Cryptographic HardwareandEmbeddedSystems,heldinCologneonSeptember8-10,2003.As with every previous workshop, there was a record number of submissions despite themuchearlierdeadlineinthisyear’scallforpapers.
The doub- blindreviewprocessinvolveda27-memberprogramcommittee anda largen- ber of external sub-referees. The review process concluded with a two week d- cussion process which resulted in 32 papers being selected for presentation. We are grateful to the program committee members and the external sub-referees for carrying out such an enormous task.
A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis Written by authors known within the academic cryptography community, this book presents the latest developments in current research Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach – algorithm to implementation – covers security from start to completion Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis
Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes.After a brief review of coding history and Boolean algebra, the book introduces linear codes, including Hamming and Golay codes.
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field.With numerous additions and restructured material, this edition presents the ideas behind cryptography and the applications of the subject. The first chapter provides a thorough treatment of the mathematics necessary to understand cryptography, including number theory and complexity, while the second chapter discusses cryptographic fundamentals, such as ciphers, linear feedback shift registers, modes of operation, and attacks.
In his first book since the bestselling Fermat’s Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.T
Lattices are geometric objects that can be pictorially described as the set of intersection points of an infinite, regular n-dimensional grid. De spite their apparent simplicity, lattices hide a rich combinatorial struc ture, which has attracted the attention of great mathematicians over the last two centuries. Not surprisingly, lattices have found numerous ap plications in mathematics and computer science, ranging from number theory and Diophantine approximation, to combinatorial optimization and cryptography.
Der Band behandelt die aktuellen Techniken der modernen Kryptographie wie Verschlüsselung und digitale Signaturen. Alle mathematischen Grundlagen werden anhand zahlreicher Beispiele und Übungen behandelt, so dass Lesern ein fundiertes Verständnis der modernen Kryptographie vermittelt wird. In die 5. Auflage hat der Autor die Beweise für die Sicherheit des Lamport-Diffie-Einmalsignaturverfahrens und des Merkle-Signaturverfahrens sowie einen Abschnitt über algebraische Angriffe auf Blockchiffren neu aufgenommen.
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.
WHY A THIRD EDITION?
The art and science of cryptography has been evolving for thousands of years.
In today’s corporations, information security professionals have a lot on their plate. In the face of constantly evolving cyber threats they must comply with numerous laws and regulations, protect their company’s assets and mitigate risks to the furthest extent possible.Security professionals can often be ignorant of the impact that implementing security policies in a vacuum can have on the end users’ core business activities. These end users are, in turn, often unaware of the risk they are exposing the organisation to.
Nowadays one only needs to read the newspaper headlines to appreciate the importance of Industrial Network Security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyberwar. Whether we talk about process control systems that run chemical plants and refineries, supervisory control and data acquisition (SCADA) systems for utilities, or factory automation systems for discrete manufacturing, the backbone of our nation’s critical infrastructure consists of these industrial networks and is dependent on their continued operation.T
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government―international, national, state, and local.• Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers• Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics• Supplies examinations of both the domestic and international efforts to combat cybercrime• Serves an ideal text for first-year undergraduate students in criminal justice programs
A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security. Written by three high–profile experts, including Eric Cole, an ex–CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who cowrote The CISSP Prep Guide and other security bestsellers
All new, for ASP.NET 2.0, this bestselling book provides experienced developers with real–world examples of the powerful new time–saving, code–saving features in this new version. Seasoned author and International .NET Association founder Bill Evjen along with Scott Hanselman help developers make a smooth transition to this new version of ASP.NET with their clear explanations of even the most dramatic changes.
Showing 1561–1584 of 1605 results