You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The bestselling first edition of "Disappearing Cryptography" was known as the best introduction to information hiding. This fully revised and expanded second edition describes a number of different techniques that people can use to hide information, such as encryption.
Read this story of how a loose-knit group of programmers, dreamers, philosophers, geniuses and fools discovered the fact that that they could write better software in less time by just giving it all away. Follow the ecstasy, the triumphs, the battles, the failures, the treachery, the cooperation, the wrong turns, the teamwork, the struggles, and the backbiting on the road to triumph and total global domination. Show Excerpt Blue Screen of Death" that appears on Windows users' monitors when something goes irretrievably wrong is the butt of many jokes. Linux users also bragged about the quality of their desktop interface. Most of the uninitiated thought of Linux as a hacker's system built for ...
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactio...
It is difficult to think of a more urgent question for Buddhism in the late twentieth century than human rights. The political, ethical and philosophical questions surrounding human rights are debated vigorously in political and intellectual circles throughout the world and now in this volume.
You'll learn not only to choose the optimal compression strategy for your project, but also to apply it in a way that guarantees the best possible results."--BOOK JACKET.
None
Teaching the theory of error correcting codes on an introductory level is a difficulttask. The theory, which has immediate hardware applications, also concerns highly abstractmathematical concepts. This text explains the basic circuits in a refreshingly practical way thatwill appeal to undergraduate electrical engineering students as well as to engineers and techniciansworking in industry.Arazi's truly commonsense approach provides a solid grounding in the subject,explaining principles intuitively from a hardware perspective. He fully covers error correctiontechniques, from basic parity check and single error correction cyclic codes to burst errorcorrecting codes and convolutional codes. All...
This volume covers the modern developments in boiling heat transfer and two-phase flow, and is intended to provide industrial, government and academic researchers with state-of-the-art research findings in the area of multiphase flow and heat transfer technology. Special attention is given to technology transfer, indicating how recent significant results may be used for practical applications. The chapters give detailed technical material that will be useful to engineers and scientists who work in the field of multiphase flow and heat transfer. The authors of all chapters are members of the CMR at Rensselaer, a research centre specializing in the state-of-the-art in multiphase science.