• Ebook Codes - The Guide to Secrecy From Ancient to Modern Times

    Ebook Codes - The Guide to Secrecy From Ancient to Modern Times

    This book has been written with a broad spectrum of readers in mind, which includes anyone interested in secrecy and related issues. Thus, this is a tome for the merely curious, as well as history-minded readers, amateur mathematicians, engineers, bankers, academics, students, those practitioners working in cryptography, specialists in the field, and instructors wanting to use the book for a text in a course on a variety of topics related to...

     700 p actvn 27/02/2022 65 2

  • Ebook Information security: Fundamentals

    Ebook Information security: Fundamentals

    The purpose of information security is to protect an organization’s valuableresources, such as information, computer hardware, and software. Throughthe selection and application of appropriate safeguards, security helps theorganization’s mission by protecting its physical and financial resources,reputation, legal position, employees, and other tangible and intangibleassets. To many, security is sometimes viewed as thwarting the...

     262 p actvn 27/02/2022 56 0

  • Ebook Hacking: The art of exploitation

    Ebook Hacking: The art of exploitation

    The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem esotericand confusing because of just a few gaps in this prerequisite education. This second edition of Hacking: The Art of Exploitation makes the world of hacking more accessible by providing the complete picture—from programming to machine...

     492 p actvn 27/02/2022 65 1

  • Ebook Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network

    Ebook Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network

    Books about Internet security are common (firewall technology seems to dominate the subject list). In such books, the information is often sparse, confined to a narrow range of products. Authors typically include full-text reproductions of stale, dated documents that are readily available on the Net. This poses a problem, mainly because such texts are impractical. Experienced readers are already aware of these reference sources, and...

     670 p actvn 27/02/2022 44 1

  • Ebook Understanding cryptography: A Textbook for Students and Practitioners

    Ebook Understanding cryptography: A Textbook for Students and Practitioners

    This book provides the reader with a deep understanding of how modern cryptographic schemes work. We introduce the necessary mathematical concepts in away that is accessible for every reader with a minimum background in college-level calculus. It is thus equally well suited as a textbook for undergraduate or beginning graduate classes, or as a reference book for practicing engineers and computerscientists who are interested in a solid...

     382 p actvn 27/02/2022 61 1

  • Ebook Hacking exposed: Network security secrets and solutions (Third edition)

    Ebook Hacking exposed: Network security secrets and solutions (Third edition)

    Typically, these actors attempt to exploit flaws in the system implementation or its deployment in order to obtain information, acquire access to services, or simply to disrupt the operation of the cloud through loss of system availability or system and information integrity. As the description of these attacks implies some of these attacks violate the tenant boundaries and hardware abstraction layers that VMware vCloud Director attempts to...

     260 p actvn 27/02/2022 49 0

  • Ebook Security+ Study Guide and DVD Training System

    Ebook Security+ Study Guide and DVD Training System

    All of CompTIA’s published objectives for the Security+exam are covered in this book. To help you easily find the sections that directly support particular objectives, we’ve referenced the domain and objective number next to the corresponding text in the following Table of Contents. In some chapters, we’ve made the judgment that it is probably easier for the student to cover objectives in as lightly different sequence than the order of...

     862 p actvn 27/02/2022 52 0

  • Ebook Open Source Security Tools: Practical Applications for Security - Tony Howlett

    Ebook Open Source Security Tools: Practical Applications for Security - Tony Howlett

    This book covers most of the major areas of information security and the open source tools you can use to help secure them. The chapters are designed around the major disciplines of information security and key concepts are covered in each chapter. The tools included on the book’s CD-ROM allow for a lab-like environment that everyone can participate in. All you need is a PC and this book’s CD-ROM to start using the tools described herein.

     600 p actvn 27/02/2022 53 0

  • Ebook Ethernet networks (4th edition): Part 1

    Ebook Ethernet networks (4th edition): Part 1

    Part 1 book "Ethernet networks" has contents: Introduction to networking concepts, networking standards, ethernet networks, frame operations, networking hardware and software.

     292 p actvn 31/01/2022 90 0

  • Ebook Ethernet networks (4th edition): Part 2

    Ebook Ethernet networks (4th edition): Part 2

    Part 2 book "Ethernet networks" has contents: Bridging and switching methods and performance issues, routers, wireless ethernet, managing the network, the future of ethernet, security.

     307 p actvn 31/01/2022 75 0

  • Ebook Interactive computer graphics (5th edition): Part 1

    Ebook Interactive computer graphics (5th edition): Part 1

    Interactive computer graphics: A Top-Down approach with shader-Based OpenGL®, is the only introduction to computer graphics text for undergraduates that fully integrates OpenGL 3.1 and emphasizes application-based programming. Using C and C++, the top-down, programming-oriented approach allows for coverage of engaging 3D material early in the text so readers immediately begin to create their own 3D graphics. Low-level algorithms (for topics...

     490 p actvn 31/01/2022 81 0

  • Ebook Interactive computer graphics (5th edition): Part 2

    Ebook Interactive computer graphics (5th edition): Part 2

    Computer animation and graphics–once rare, complicated, and comparatively expensive–are now prevalent in everyday life from the computer screen to the movie screen. This book is suitable for undergraduate students in computer science and engineering, for students in other disciplines who have good programming skills, and for professionals.

     377 p actvn 31/01/2022 74 0

Hướng dẫn khai thác thư viện số