Flylib.com
Cryptography: Theory and Practice:Authentication Codes
Previous page
Table of content
Next page
Previous page
Table of content
Next page
Modern Cryptography: Theory and Practice
ISBN: 0130669431
EAN: 2147483647
Year: 1995
Pages: 133
Authors:
Wenbo Mao
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Asymmetric Key Cryptography
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
High-Speed Signal Propagation[c] Advanced Black Magic
Power Ratios
DC Conductance
IBIS: Issues with SSO Noise
Points to Remember
Simple Cases Involving Transmission Lines
WebLogic: The Definitive Guide
Software and Versions
Using J2EE Services on the Object Tier
Network Configuration
The XML Registry
XML Application Scoping
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
Constants, Variables, and Arrays
Using Procedures to Organize Scripts
Combining Different Scripting Languages
Appendix C Whats on the CD-ROM?
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Creating a Struts-based MVC Application
Form Presentation and Validation with Struts
Building a Data Access Tier with ObjectRelationalBridge
Building the JavaEdge Application with Ant and Anthill
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #4: Base Decisions on Data and Facts
When Companies Start Using Lean Six Sigma
Six Things Managers Must Do: How to Support Lean Six Sigma
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies