• Ebook VLSI architectures for modern error-correcting codes: Part 2

    Ebook VLSI architectures for modern error-correcting codes: Part 2

    Part 2 book "VLSI architectures for modern error-correcting codes" includes content: BCH encoder and decoder architectures, binary LDPC codes and decoder architectures, non-binary LDPC decoder architectures.

     194 p actvn 27/05/2024 3 0

  • Ebook VLSI architectures for modern error-correcting codes: Part 1

    Ebook VLSI architectures for modern error-correcting codes: Part 1

    Part 1 book "VLSI architectures for modern error-correcting codes" includes content: Finite field arithmetic, VLSI architecture design fundamentals, root computations for polynomials over finite fields, algebraic soft-decision Reed-Solomon decoder architectures, Reed-Solomon encoder and hard-decision and erasure decoder architectures, interpolation-based Chase and generalized minimum distance decoders.

     211 p actvn 27/05/2024 4 0

  • Ebook Cracking the coding interview (5th edition): Part 1

    Ebook Cracking the coding interview (5th edition): Part 1

    Ebook Cracking the coding interview (5th edition): Part 1 includes contents: The interview process, behind the scenes, special situations, before the interview, behavioral questions, technical questions, the offer and beyond.

     75 p actvn 26/03/2024 26 0

  • Ebook Cracking the coding interview (5th edition): Part 2

    Ebook Cracking the coding interview (5th edition): Part 2

    Ebook Cracking the coding interview (5th edition): Part 2 includes contents: Data structures, concepts and algorithms, knowledge based, additional review problems, threads and lock, recursion and dynamic programming, brain teaser, bit manipulation,... and other contents.

     435 p actvn 26/03/2024 20 0

  • Ebook Encyclopedia of networking (Second edition)

    Ebook Encyclopedia of networking (Second edition)

    This book contains comprehensive, straightforward summaries of the major concepts, issues, and approaches related to networking. Networking is defined broadly to encompass configurations ranging from a couple of connected computers just a few feet apart to a network of several thousand machines (of all types and sizes) scattered around the world. You’ll find discussions of networking as it’s done by servers and clients, managers and...

     1268 p actvn 26/03/2024 19 0

  • Lecture Cryptography and network security: Chapter 3

    Lecture Cryptography and network security: Chapter 3

    Lecture Cryptography and network security: Chapter 3 after studying this section will help you understand: To define the terms and the concepts of symmetric key ciphers; To emphasize the two categories of traditional ciphers: substitution and transposition ciphers; To describe the categories of cryptanalysis used to break the symmetric ciphers;

     67 p actvn 26/03/2024 19 0

  • Lecture Cryptography and network security: Chapter 2

    Lecture Cryptography and network security: Chapter 2

    Lecture Cryptography and network security: Chapter 2 after studying this section will help you understand: To review integer arithmetic, concentrating on divisibility and finding the greatest common divisor using the Euclidean algorithm; To understand how the extended Euclidean algorithm can be used to solve linear Diophantine equations, to solve linear congruent equations, and to find the multiplicative inverses;...

     82 p actvn 26/03/2024 17 0

  • Lecture Cryptography and network security: Chapter 1

    Lecture Cryptography and network security: Chapter 1

    Lecture Cryptography and network security: Chapter 1 after studying this section will help you understand: To define three security goals; To define security attacks that threaten security goals; To define security services and how they are related to the three security goals; To define security mechanisms to provide security services;

     22 p actvn 26/03/2024 23 0

  • Lecture Cryptography and network security: Chapter 4

    Lecture Cryptography and network security: Chapter 4

    Lecture Cryptography and network security: Chapter 4 after studying this section will help you understand: To review the concept of algebraic structures; To define and give some examples of groups; To define and give some examples of rings; To define and give some examples of fields;...

     56 p actvn 26/03/2024 19 0

  • Lecture Cryptography and network security: Chapter 5

    Lecture Cryptography and network security: Chapter 5

    Lecture Cryptography and network security: Chapter 5 after studying this section will help you understand: To distinguish between traditional and modern symmetric-key ciphers; To introduce modern block ciphers and discuss their characteristics; To explain why modern block ciphers need to be designed as substitution ciphers.

     67 p actvn 26/03/2024 16 0

  • Lecture Cryptography and network security: Chapter 6

    Lecture Cryptography and network security: Chapter 6

    Lecture Cryptography and network security: Chapter 6 after studying this section will help you understand: To review a short history of DES; To define the basic structure of DES ; To describe the details of building elements of DES; To describe the round keys generation process;...

     63 p actvn 26/03/2024 21 0

  • Lecture Cryptography and network security: Chapter 7

    Lecture Cryptography and network security: Chapter 7

    Lecture Cryptography and network security: Chapter 7 after studying this section will help you understand: To review a short history of AES; To define the basic structure of AES; To define the transformations used by AES; To define the key expansion process;...

     66 p actvn 26/03/2024 19 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn
getDocumentFilter3 strKey=LIBTAILIEU2_LIST_FILTERactvn657710vi