Research & information: general
Product Compare (0)
The Science of Secrecy from Ancient Egypt to Quantum CryptographyFrom the best-selling author of Fer..
All you need to know about making and breaking codes.Gem Codes and Ciphers touches on everything fro..
An acclaimed theorist offers a provocative and chilling warning: todays advanced societies have grow..
CAN YOU EVER BE SURE YOU'RE MAKING THE RIGHT DECISION? Should you stay in a comfy job with little c..
A step-by-step guidebook for understanding and implementing integrated financial risk measurement an..
A revolutionary new approach for detecting and managing inherent risk The unprecedented turmoil in ..
A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT securi..
Security Smarts for the Self-Guided IT Professional This complete, practical resource for security ..
Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solv..
This dictionary contains 13,000 terms with more than 4,000 cross-references used in the following fi..
The book introduces a hot topic of novel and emerging computing paradigms and architectures -computa..
This volume contains the proceedings of ADHS'06: the 2nd IFAC Conference on Analysis and Design of H..
There has been a common perception that computational complexity is a theory of "e;bad news"..
The Curry-Howard isomorphism states an amazing correspondence between systems of formal logic as enc..
Quantum Computation and Quantum Information (QIP) deals with the identification and use of quantum r..
Showing 1 to 15 of 283 (19 Pages)