• Ebook Perfect passwords: Selection, protection, authentication

    Ebook Perfect passwords: Selection, protection, authentication

    Ebook "Perfect passwords: Selection, protection, authentication" includes contents: Chapter 1 passwords: the basics and beyond, chapter 2 meet your opponent, chapter 3 is random really random?, chapter 4 character diversity: beyond the alphabet, chapter 5 password length: making it count, chapter 6 time: the enemy of all secrets, chapter 7 living with passwords, chapter 8 ten password pointers: building strong passwords, chapter 9 the 500...

     200 p actvn 27/05/2024 1 0

  • Ebook Penetration testing essentials

    Ebook Penetration testing essentials

    In "Penetration testing essentials", the following content will be discussed: Chapter 1 introduction to penetration testing, chapter 2 introduction to operating systems and networking, chapter 3 introduction to cryptography, chapter 4 outlining the pen testing methodology, chapter 5 gathering intelligence, chapter 6 scanning and enumeration, chapter 7 conducting vulnerability scanning, chapter 8 cracking passwords, chapter 9 retaining access...

     287 p actvn 27/05/2024 1 0

  • Ebook Privacy, security and trust within the context of pervasive computing

    Ebook Privacy, security and trust within the context of pervasive computing

    The goal of the workshop was not to focus on specific, even novel mechanisms, rather on the interfaces between mechanisms in different technical and social problem spaces. 21 people from different parts of the world took part in the one-day discussion, including PhD students, seasoned and junior researchers. This workshop promises to be a lasting experience and we encourage researchers to participate in future events. We hope that you will...

     182 p actvn 27/05/2024 1 0

  • Ebook Secure data management in decentralized systems

    Ebook Secure data management in decentralized systems

    Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource...

     461 p actvn 27/05/2024 1 0

  • Ebook Insider attack cyber security beyond the hacker

    Ebook Insider attack cyber security beyond the hacker

    Ebook "Insider attack cyber security beyond the hacker" includes content: The insider attack problem nature and scope; reflections on the insider threat; a survey of insider attack detection research; naive bayes as a masquerade detector - addressing a chronic failure; towards a virtualization enabled framework for information traceability,... and other contents.

     228 p actvn 27/05/2024 0 0

  • Ebook VLSI architectures for modern error-correcting codes: Part 2

    Ebook VLSI architectures for modern error-correcting codes: Part 2

    Part 2 book "VLSI architectures for modern error-correcting codes" includes content: BCH encoder and decoder architectures, binary LDPC codes and decoder architectures, non-binary LDPC decoder architectures.

     194 p actvn 27/05/2024 2 0

  • Ebook VLSI architectures for modern error-correcting codes: Part 1

    Ebook VLSI architectures for modern error-correcting codes: Part 1

    Part 1 book "VLSI architectures for modern error-correcting codes" includes content: Finite field arithmetic, VLSI architecture design fundamentals, root computations for polynomials over finite fields, algebraic soft-decision Reed-Solomon decoder architectures, Reed-Solomon encoder and hard-decision and erasure decoder architectures, interpolation-based Chase and generalized minimum distance decoders.

     211 p actvn 27/05/2024 2 0

  • Ebook Computer organization and architecture designing for performance (8/E): Part 1

    Ebook Computer organization and architecture designing for performance (8/E): Part 1

    Part 1 book "Computer organization and architecture designing for performance" includes contents: Reader’s guide, introduction, computer evolution and performance, a-top level view of computer function and interconnection, cache memory, internal memory technology, external memory, input output, operating system support, computer arithmetic, instruction sets - Characteristics and functions.

     422 p actvn 27/05/2024 1 0

  • Ebook Computer organization and architecture designing for performance (8/E): Part 2

    Ebook Computer organization and architecture designing for performance (8/E): Part 2

    Part 2 book "Computer organization and architecture designing for performance" includes contents: Instruction sets - Addressing modes and formats; processor structure and function; reduced instruction set computers (riscs); instruction level parallelism and superscalar processors, control unit operation; microprogrammed control; parallel processing; multicore computers.

     459 p actvn 27/05/2024 1 0

  • Ebook Interaction design - Beyond human-computer interaction (5/E): Part 1

    Ebook Interaction design - Beyond human-computer interaction (5/E): Part 1

    Part 1 book "Interaction design - Beyond human-computer interaction" includes contents: What is interaction design, the process of interaction design, conceptualizing interaction, cognitive aspects, social interaction, emotional interaction, interfaces, data gathering

     327 p actvn 27/05/2024 0 0

  • Ebook Interaction design - Beyond human-computer interaction (5/E): Part 2

    Ebook Interaction design - Beyond human-computer interaction (5/E): Part 2

    Part 2 book "Interaction design - Beyond human-computer interaction" includes contents: Data analysis, interpretation, and presentation; data at scale; discovering requirements; design, prototyping, and construction; interaction design in practice; introducing evaluation; evaluation studies - from controlled to natural settings; evaluation - inspections, analytics and models.

     330 p actvn 27/05/2024 0 0

  • Ebook Introduction to numerical programming: Part 1

    Ebook Introduction to numerical programming: Part 1

    Part 1 book "Introduction to numerical programming" includes contents: Approximate numbers, basic programming techniques, elements of scientific graphics, sorting and indexing, evaluation of functions, algebraic and transcendental equations, systems of linear equations.

     253 p actvn 27/05/2024 1 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn