Subcategories

Information and Communication Technologies for Humanitarian Services

Posted By: AvaxGenius
Information and Communication Technologies for Humanitarian Services

Information and Communication Technologies for Humanitarian Services by Muhammad Nazrul Islam
English | PDF | 2020 | 393 Pages | ISBN : 1785619969 | 13.7 MB

Humanitarian services seek to promote welfare to save lives, maintain human dignity, alleviate suffering, strengthen preparedness, and provide material and logistical assistance in response to humanitarian crises. They are thus different from development aids that address underlying socioeconomic factors and provides support for the social, economic and political developments of developing nations.

HTML Starter Course for absolute Beginners!!

Posted By: Sigha
HTML Starter Course for absolute Beginners!!

HTML Starter Course for absolute Beginners!!
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 285 MB
Genre: eLearning Video | Duration: 18 lectures (45 mins) | Language: English

Learn the simplest programming language HTML in the fastest way possible with least amount of resources/software.

New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA

Posted By: AvaxGenius
New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA

New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA by Khaled Salah Mohamed
English | PDF,EPUB | 2020 | 110 Pages | ISBN : 3030589951 | 20 MB

This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography. Moreover, this book covers cryptography primitives and its usage and applications and focuses on the fundamental principles of modern cryptography such as Stream Ciphers, block ciphers, public key algorithms and digital signatures.

Cryptographic Obfuscation: A Survey

Posted By: roxul
Cryptographic Obfuscation: A Survey

Máté Horváth, "Cryptographic Obfuscation: A Survey "
English | ISBN: 3319980408 | 2020 | 128 pages | PDF | 2 MB

A Classical Introduction to Cryptography: Applications for Communications Security (Repost)

Posted By: step778
A Classical Introduction to Cryptography: Applications for Communications Security (Repost)

Serge Vaudenay, "A Classical Introduction to Cryptography: Applications for Communications Security"
English | 2005 | pages: 344 | ISBN: 0387254641 | PDF | 2,7 mb

Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore

Posted By: First1
Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore

Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore by Joe Payne, Jadee Hanson, Mark Wojtasiak
English | September 29th, 2020 | ISBN: 1510764488 | 192 pages | EPUB | 3.55 MB

From data security company Code42, Inside Jobs offers companies of all sizes a new way to secure today's collaborative cultures—one that works without compromising sensitive company data or slowing business down. Authors Joe Payne, Jadee Hanson, and Mark Wojtasiak, seasoned veterans in the cybersecurity space, provide a top-down and bottom-up picture of the rewards and perils involved in running and securing organizations focused on rapid, iterative, and collaborative innovation.

Algorithms, Blockchain & Cryptocurrency: Implications for the Future of the Workplace (The Future of Work)

Posted By: First1
Algorithms, Blockchain & Cryptocurrency: Implications for the Future of the Workplace (The Future of Work)

Algorithms, Blockchain & Cryptocurrency: Implications for the Future of the Workplace (The Future of Work) by Gavin Brown, Richard Whittle
English | January 20th, 2020 | ISBN: 1838674985 | 250 pages | EPUB | 0.60 MB

The convergence of Algorithms, Blockchain and Cryptocurrency (ABC) has the potential to fundamentally disrupt the current world of work. This book investigates the effects of this on the worker, the organisation and the economy, by considering a future where the traditional power relationships between workers and firms no longer apply.

Multivariate Public Key Cryptosystems Ed 2

Posted By: roxul
Multivariate Public Key Cryptosystems  Ed 2

Jintai Ding, "Multivariate Public Key Cryptosystems Ed 2"
English | ISBN: 1071609858 | 2020 | 278 pages | PDF | 3 MB

Proceedings of International Conference on Trends in Computational and Cognitive Engineering: TCCE 2019

Posted By: AvaxGenius
Proceedings of International Conference on Trends in Computational and Cognitive Engineering: TCCE 2019

Proceedings of International Conference on Trends in Computational and Cognitive Engineering: TCCE 2019 by Phool Singh
English | PDF | 2021 | 367 Pages | ISBN : 9811554137 | 14.96 MB

This book presents various computational and cognitive modeling approaches in the areas of health, education, finance, theenvironment, engineering, commerce and industry. Gathering selected conference papers presented atthe International Conference on Trends in Computational and Cognitive Engineering (TCCE), it sharescutting-edge insights and ideas from mathematicians, engineers, scientists and researchers anddiscusses fresh perspectives on problem solving in a range of research areas.

Computational Science and Its Applications – ICCSA 2020

Posted By: AvaxGenius
Computational Science and Its Applications – ICCSA 2020

Computational Science and Its Applications – ICCSA 2020: 20th International Conference, Cagliari, Italy, July 1–4, 2020, Proceedings, Part VI by Osvaldo Gervasi
English | PDF | 2020 | 1067 Pages | ISBN : 3030588165 | 129.74 MB

The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020. Due to COVID-19 pandemic the conference was organized in an online event.

Computational Science and Its Applications – ICCSA 2020

Posted By: AvaxGenius
Computational Science and Its Applications – ICCSA 2020

Computational Science and Its Applications – ICCSA 2020: 20th International Conference, Cagliari, Italy, July 1–4, 2020, Proceedings, Part III by Osvaldo Gervasi
English | PDF | 2020 | 1062 Pages | ISBN : 3030588076 | 172.4 MB

The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020. Due to COVID-19 pandemic the conference was organized in an online event.

Computational Science and Its Applications – ICCSA 2020

Posted By: AvaxGenius
Computational Science and Its Applications – ICCSA 2020

Computational Science and Its Applications – ICCSA 2020: 20th International Conference, Cagliari, Italy, July 1–4, 2020, Proceedings, Part IV by Osvaldo Gervasi
English | PDF | 2020 | 1085 Pages | ISBN : 3030588106 | 224.35 MB

The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020. Due to COVID-19 pandemic the conference was organized in an online event.

Algorithms and Architectures for Parallel Processing

Posted By: AvaxGenius
Algorithms and Architectures for Parallel Processing

Algorithms and Architectures for Parallel Processing: 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2–4, 2020, Proceedings, Part III by Meikang Qiu
English | PDF | 2020 | 722 Pages | ISBN : 3030602478 | 72.04 MB

This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020.

Cryptography Arithmetic: Algorithms and Hardware Architectures

Posted By: AvaxGenius
Cryptography Arithmetic: Algorithms and Hardware Architectures

Cryptography Arithmetic: Algorithms and Hardware Architectures by Amos R. Omondi
English | EPUB | 2020 | 338 Pages | ISBN : 3030341410 | 12.37 MB

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level.

Theory of Cryptography, Part II (Repost)

Posted By: step778
Theory of Cryptography, Part II (Repost)

Yael Kalai, Leonid Reyzin, "Theory of Cryptography, Part II"
English | 2017 | pages: 777 | ISBN: 3319705024 | PDF | 14,0 mb