This book is almost entirely concerned with stream ciphers, concentrating on a particular mathematical model for such ciphers which are called...
A Mathematical Introduction to Logic, Second Edition, offers increased flexibility with topic coverage, allowing for choice in how to utilize the...
Information Modeling and Relational Databases provides an introduction to ORM (Object Role Modeling)-and much more. In fact, it's the only book to go...
Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their...
In order for wireless devices to function, the signals must be coded in standard ways so that the sender and the receiver can communicate. This area...
Given modern society's need to control its ever-increasing body of information, digital libraries will be among the most important and influential...
The second edition of this highly successful text focuses on the major changes that have taken place in this field in recent times. Data Acquisition...
Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in...
Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with...
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see...