• Ebook Cracking the coding interview (5th edition): Part 1

    Ebook Cracking the coding interview (5th edition): Part 1

    Ebook Cracking the coding interview (5th edition): Part 1 includes contents: The interview process, behind the scenes, special situations, before the interview, behavioral questions, technical questions, the offer and beyond.

     75 p actvn 26/03/2024 1 0

  • Ebook Cracking the coding interview (5th edition): Part 2

    Ebook Cracking the coding interview (5th edition): Part 2

    Ebook Cracking the coding interview (5th edition): Part 2 includes contents: Data structures, concepts and algorithms, knowledge based, additional review problems, threads and lock, recursion and dynamic programming, brain teaser, bit manipulation,... and other contents.

     435 p actvn 26/03/2024 1 0

  • Ebook Encyclopedia of networking (Second edition)

    Ebook Encyclopedia of networking (Second edition)

    This book contains comprehensive, straightforward summaries of the major concepts, issues, and approaches related to networking. Networking is defined broadly to encompass configurations ranging from a couple of connected computers just a few feet apart to a network of several thousand machines (of all types and sizes) scattered around the world. You’ll find discussions of networking as it’s done by servers and clients, managers and...

     1268 p actvn 26/03/2024 1 0

  • Lecture Cryptography and network security: Chapter 3

    Lecture Cryptography and network security: Chapter 3

    Lecture Cryptography and network security: Chapter 3 after studying this section will help you understand: To define the terms and the concepts of symmetric key ciphers; To emphasize the two categories of traditional ciphers: substitution and transposition ciphers; To describe the categories of cryptanalysis used to break the symmetric ciphers;

     67 p actvn 26/03/2024 1 0

  • Lecture Cryptography and network security: Chapter 2

    Lecture Cryptography and network security: Chapter 2

    Lecture Cryptography and network security: Chapter 2 after studying this section will help you understand: To review integer arithmetic, concentrating on divisibility and finding the greatest common divisor using the Euclidean algorithm; To understand how the extended Euclidean algorithm can be used to solve linear Diophantine equations, to solve linear congruent equations, and to find the multiplicative inverses;...

     82 p actvn 26/03/2024 1 0

  • Lecture Cryptography and network security: Chapter 1

    Lecture Cryptography and network security: Chapter 1

    Lecture Cryptography and network security: Chapter 1 after studying this section will help you understand: To define three security goals; To define security attacks that threaten security goals; To define security services and how they are related to the three security goals; To define security mechanisms to provide security services;

     22 p actvn 26/03/2024 1 0

  • Lecture Cryptography and network security: Chapter 4

    Lecture Cryptography and network security: Chapter 4

    Lecture Cryptography and network security: Chapter 4 after studying this section will help you understand: To review the concept of algebraic structures; To define and give some examples of groups; To define and give some examples of rings; To define and give some examples of fields;...

     56 p actvn 26/03/2024 0 0

  • Lecture Cryptography and network security: Chapter 5

    Lecture Cryptography and network security: Chapter 5

    Lecture Cryptography and network security: Chapter 5 after studying this section will help you understand: To distinguish between traditional and modern symmetric-key ciphers; To introduce modern block ciphers and discuss their characteristics; To explain why modern block ciphers need to be designed as substitution ciphers.

     67 p actvn 26/03/2024 0 0

  • Lecture Cryptography and network security: Chapter 6

    Lecture Cryptography and network security: Chapter 6

    Lecture Cryptography and network security: Chapter 6 after studying this section will help you understand: To review a short history of DES; To define the basic structure of DES ; To describe the details of building elements of DES; To describe the round keys generation process;...

     63 p actvn 26/03/2024 0 0

  • Lecture Cryptography and network security: Chapter 7

    Lecture Cryptography and network security: Chapter 7

    Lecture Cryptography and network security: Chapter 7 after studying this section will help you understand: To review a short history of AES; To define the basic structure of AES; To define the transformations used by AES; To define the key expansion process;...

     66 p actvn 26/03/2024 0 0

  • Lecture Cryptography and network security: Chapter 8

    Lecture Cryptography and network security: Chapter 8

    Lecture Cryptography and network security: Chapter 8 after studying this section will help you understand: To show how modern standard ciphers, such as DES or AES, can be used to encipher long messages. To discuss five modes of operation designed to be used with modern block ciphers. To define which mode of operation creates stream ciphers out of the underlying block ciphers.

     41 p actvn 26/03/2024 0 0

  • Lecture Cryptography and network security: Chapter 9

    Lecture Cryptography and network security: Chapter 9

    Lecture Cryptography and network security: Chapter 9 after studying this section will help you understand: To introduce prime numbers and their applications in cryptography. To discuss some primality test algorithms and their efficiencies. To discuss factorization algorithms and their applications in cryptography.

     50 p actvn 26/03/2024 0 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn
getDocumentFilter3 strKey=LIBTAILIEU2_LIST_FILTERactvn257710vi