e99 Online Shopping Mall

Geometry.Net - the online learning center Help  
Home  - Sports - Hashing (Books)

  Back | 41-60 of 72 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

click price to see details     click image to enlarge     click link to go to the store

 
41. Hashing moving objects (Computer
 
42. Hashing: Masters for making overhead
 
43. Robin Hood hashing (Research report.
 
44. Relative prime transformation
 
45. Dynamic file organizations for
 
46. A general purpose scatter storage
 
47. Searching on alphanumeric keys
$78.70
48. Security and Privacy in Digital
$42.01
49. String Processing and Information
$11.94
50. Cryptographic Libraries for Developers
$62.11
51. Graph-Based Representations in
$10.95
52. Unique file identification in
$10.95
53. Accurate discovery of co-derivative
 
54. Searching algorithms (Teubner-Texte
 
55. Using hash functions as a hedge
 
56. A lexical analogy to feature matching
 
57. Hash tables in PRAM and VLSI models
 
58. Parallel access to hash tables
 
59. A new method for generating minimal
 
60. Rationale for bit fixing in the

41. Hashing moving objects (Computer science technical report series CS-TR)
by Zhexuan Song
 Unknown Binding: 31 Pages (2000)

Asin: B0006RTH60
Canada | United Kingdom | Germany | France | Japan

42. Hashing: Masters for making overhead slides (OSU-CS-TR)
by George E Hedrick
 Unknown Binding: Pages (1995)

Asin: B0006QNHAI
Canada | United Kingdom | Germany | France | Japan

43. Robin Hood hashing (Research report. University of Waterloo. Department of Computer Science)
by Pedro Celis
 Unknown Binding: 68 Pages (1986)

Asin: B0007B71KY
Canada | United Kingdom | Germany | France | Japan

44. Relative prime transformation aids the minimal perfect hashing function
by Celestina T Fung
 Unknown Binding: Pages (1986)

Asin: B0007BDEU0
Canada | United Kingdom | Germany | France | Japan

45. Dynamic file organizations for partial match retrieval based on linear hashing (Technical report. University of Minnesota. Institute of Technology. Computer Science Dept)
by T. S Yuen
 Unknown Binding: 33 Pages (1985)

Asin: B00071FYLW
Canada | United Kingdom | Germany | France | Japan

46. A general purpose scatter storage subsystem and a comparison of hashing methods (SuDoc NAS 1.26:175814)
by Steven C. Macy
 Unknown Binding: Pages (1984)

Asin: B00010KTLE
Canada | United Kingdom | Germany | France | Japan

47. Searching on alphanumeric keys using local balanced trie hashing (Technical report. Carleton University. School of Computer Science)
by Ekow J Otoo
 Unknown Binding: 36 Pages (1987)

Asin: B0007BQDS0
Canada | United Kingdom | Germany | France | Japan

48. Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers (Lecture Notes in Computer Science)
Paperback: 245 Pages (2002-06-10)
list price: US$99.00 -- used & new: US$78.70
(price subject to change: see help)
Asin: 3540436774
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Security and Privacy in Digital Rights Management, DRM 2001, held during the ACM CCS-8 Conference in Philadelphia, PA, USA, in November 2001. The 14 revised full papers presented were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on renewability, fuzzy hashing, cryptographic techniques and fingerprinting, privacy and architectures, software tamper resistance, cryptanalysis, and economic and legal aspects. ... Read more


49. String Processing and Information Retrieval: 16th International Symposium, SPIRE 2009 Saariselkä, Finland, August 25-27, 2009 Proceedings (Lecture Notes ... Computer Science and General Issues)
Paperback: 354 Pages (2009-09-18)
list price: US$79.95 -- used & new: US$42.01
(price subject to change: see help)
Asin: 3642037836
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

This book constitutes the refereed proceedings of the 16th String Processing and Information Retrieval Symposium, SPIRE 2009 held in Saariselkä, Finland in August 2009.

The 34 revised full papers were carefully reviewed and selected from 84 submissions. The papers are organized in topical sections on algorithms on trees, compressed indexes, compression, indexing, content analysis, string algorithms and bioinformatics, string algorithms and theory, and using and understanding usage.

... Read more

50. Cryptographic Libraries for Developers (Programming Series)
by Ed Moyle, Diana Kelley
Paperback: 464 Pages (2005-12-15)
list price: US$49.95 -- used & new: US$11.94
(price subject to change: see help)
Asin: 1584504099
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Learn to Use the Right Cryptography Library Everytime!

No longer is it an option for software to include cryptography; everyone from office suites to accounting software and eCommerce Web sites use it. So today’s developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familiar enough with the available products to select the right API/library and get up and running with it quickly.Cryptographic Libraries for Developers teaches developers about the available APIs and helps them select the right ones for their projects based on platform, language, and regulatory requirements. The book serves as a nuts and bolts guide to writing software using these libraries and provides abundant examples and detailed examples throughout. The libraries covered include OpenSSL, B/Safe, the Java Cryptographic Library (JCE,) as sign/verify, encrypt/decrypt (asymmetric and symmetric,) MACs, and Hashing, as well as higher-level primitives such as X.509 digital certificates and secure (SSL) communications.

Key Features:• Provides a practical guide that teaches developers how to rapidly write and del=ploy applications requiring cryptography• Covers the five common cryptography libraries: OpenSSL, B/Safe, the Java Cryptographic Library (JCE), and CAPI• Teaches developers how to write security features for commercial software• Includes a CD-ROM with all of the features and source code from the book

On the CD!• Code Snippets: The snippets of examples source code used throughout this book are included on this CD-ROM within their broader context• Example Applications: Example frameworks and applications developed using the techniques, libraries, and strategies described within this book. Included as well are any and all design diagrams used in the preparation of the examples

System RequirementsWindows: Microsoft Windows NT 4.0 Sp6, Microsoft Windows XP Professional or Home, of 2003 Server, 256MB RAM, 20MB fixed storage (required for compilation of samples), a compiler and/or development environment corresponding to the samples you wish to utilize. For example, Microsoft Visual Studio, Visual C++, Sun’s Java 2 Platform Standard Edition (i.e., the JDK), etc.UNIX: A POSIX-compliant operating system such as Solaris, Linux, BSD, HPUX, True-64, AIX, etc.; 10MB fixed storage (repaired for compilation of samples, a compiler and/or development environment corresponding to the samples you wish to utilize. For example, gcc/g++, Sun’s Java 2 Platform Standard Edition (i.e., the JDK), etc. OPTIONAL: To compile C/C++ software, the "make" utility greatly increases the efficiency of the compilation process. ... Read more

Customer Reviews (3)

4-0 out of 5 stars How to write and deploy cryotography applications
Ed Moyle and Diana Kelley's CRYPTOGRAPHIC LIBRARIES FOR DEVELOPERS is a winning guide for developers seeking a tutorial on how to write and deploy applications requiring cryptography. The five common cryptography libraries are surveyed in a title which teaches which ones are best for different projects based on platform, language and regulatory requirements, offering software writers plenty of examples and explanations.

3-0 out of 5 stars Fills a needed niche, but lacks details for the curious
This book is neither a security book nor is it a cryptography book. Instead it is a book for programmers who want to use available APIs to add security and cryptography to the code they are writing without having to actually learn cryptography. Thus, it is assumed that the reader is proficient in C, C++, or Java programming, depending upon which cryptography API you are planning to employ. The authors spend the first part of the book going over what I consider to be a very bare outline of cryptography techniques and development goals for cryptographic code. They spend the second half of the book talking about specific cryptographic API's and how to program cryptographic solutions using each of these API's. The API's covered are OpenSSL, CryptoAPI (CAPI), JCA/JCE (Java Cryptography API), and BSAFE. Each API has its own chapter that contains an API overview and code examples. The book's grand finale is a chapter on applications that shows how to build a multilibrary cryptographic interface in C++, and also how to perform file content protection in C++.
The authors say that their goal is to shave development time for working programmers, and in that goal they succeed. However, it is very hard to succeed at a task by rote learning, and this book on cryptographic programming without any of the pesky but interesting mathematical details just left me wanting more. If you want a couple of good books on cryptography and network security themselves might I recommend "Cryptography and Network Security (4th Edition)" by Stallings, and also "Applied Cryptography" by Schneier. Stallings' book was only recently published, is very easy to read, and covers both subjects comprehensively in an accessible style. Schneier's book is starting to age, yet is still the definitive text for programmers who are interested in cryptographic algorithms.
I notice that Amazon does not show the table of contents for this book, so I do that here:
1. Introduction
2. Security Concepts- Developer Overview
3. Cryptographic Engineering
4. Basic Techniques
5. Implementation Choices
6. Application Development Strategies
7. Developing with OpenSSL
8. Developing with CAPI
9. Developing with JCA/JCE
10. Developing with BSAFE
11. Example Applications

5-0 out of 5 stars Making an Impossible Task Manageable
When we think of cryptography we normally think back to the codes broken during World War II, of Enigma, Magic and Purple. Today when I bought an item from e-Bay I thought nothing about putting in my credit card information because I had faith that the card number wouldn't been seen by any of the bad guys. ==We use words like 'secure transaction' and 'SSL' to tell people that sending such information is at little or no risk to them. We rarely stop to think that the reason sending this information is safe is cryptography.

At the user level, cryptography has become invisible to the ordinary operation of the web. At the serious end of cryptography, it is still an arcane world of advanced math and carefully designed and tested algorythms. This book is aimed at the application developer level, where you and I might be wanting to ensure the safe and private transmission of data, but where we don't want to get down into the heavy math.

Enter standard libraries of cryptographic routines to enable the use of very advanced techniques in standard applications code. That's the focus of this book. It investigates and describes the various libraries that are available for the safe transmission of data. These libraries make what would be an all but impossible task easily manageable. ... Read more


51. Graph-Based Representations in Pattern Recognition: 7th IAPR-TC-15 International Workshop, GbRPR 2009, Venice, Italy, May 26-28, 2009. Proceedings (Lecture ... Vision, Pattern Recognition, and Graphics)
Paperback: 378 Pages (2009-06-18)
list price: US$79.95 -- used & new: US$62.11
(price subject to change: see help)
Asin: 3642021239
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

This book constitutes the refereed proceedings of the 7th IAPR-TC-15 International Workshop on Graph-Based Representations in Pattern Recognition, GbRPR 2009, held in Venice, Italy in May 2009.

The 37 revised full papers presented were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on graph-based representation and recognition, graph matching, graph clustering and classification, pyramids, combinatorial maps, and homologies, as well as graph-based segmentation.

... Read more

52. Unique file identification in the National Software Reference Library [An article from: Digital Investigation]
by S. Mead
Digital: Pages (2006-09-01)
list price: US$10.95 -- used & new: US$10.95
(price subject to change: see help)
Asin: B000PBZT0K
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is a journal article from Digital Investigation, published by Elsevier in 2006. The article is delivered in HTML format and is available in your Amazon.com Media Library immediately after purchase. You can view it with any web browser.

Description:
The National Software Reference Library (NSRL) provides a repository of known software, file profiles, and file signatures for use by law enforcement and other organizations involved with computer forensic investigations. During a forensic investigation, hundreds of thousands of files may be encountered. The NSRL is used to identify known files. This can reduce the amount of time spent examining a computer. Matches for common operating systems and applications do not need to be searched, either manually or electronically, for evidence. Additionally, the NSRL is used to determine which software applications are present on a system. This may suggest how the computer was being used and provide information on how and where to search for evidence. This paper examines whether the techniques used to create file signatures in the NSRL produce unique results-a core characteristic that the NSRL depends on for the majority of its uses. The uniqueness of the file identification is analyzed via two methods: an empirical analysis of the file signatures within the NSRL and research into the recent attacks on the hash algorithms used to generate the file signatures within the NSRL. ... Read more


53. Accurate discovery of co-derivative documents via duplicate text detection [An article from: Information Systems]
by Y. Bernstein, J. Zobel
Digital: 14 Pages (2006-11-01)
list price: US$10.95 -- used & new: US$10.95
(price subject to change: see help)
Asin: B000P6OOZG
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is a journal article from Information Systems, published by Elsevier in 2006. The article is delivered in HTML format and is available in your Amazon.com Media Library immediately after purchase. You can view it with any web browser.

Description:
Documents are co-derivative if they share content: for two documents to be co-derived, some portion of one must be derived from the other, or some portion of both must be derived from a third document. An existing technique for concurrently detecting all co-derivatives in a collection is document fingerprinting, which matches documents based on the hash values of selected document subsequences, or chunks. Fingerprinting is hampered by an inability to accurately isolate information that is useful in identifying co-derivatives. In this paper we present spex, a novel hash-based algorithm for extracting duplicated chunks from a document collection. We discuss how information about shared chunks can be used for efficiently and reliably identifying co-derivative clusters, and describe deco, a prototype package that combines the spex algorithm with other optimisations and compressed indexing to produce a flexible and scalable co-derivative discovery system. Our experiments with multi-gigabyte document collections demonstrate the effectiveness of the approach. ... Read more


54. Searching algorithms (Teubner-Texte zur Mathematik)
by J Wiedermann
 Paperback: 123 Pages (1987)

Isbn: 3322004333
Canada | United Kingdom | Germany | France | Japan

55. Using hash functions as a hedge against chosen ciphertext attack (Research report / International Business Machines Corporation. Research Division)
by Victor Shoup
 Unknown Binding: 12 Pages (1999)

Asin: B0006RB5MY
Canada | United Kingdom | Germany | France | Japan

56. A lexical analogy to feature matching and pose estimation (SuDoc C 13.58:6790)
by John Albert Horst
 Unknown Binding: Pages (2002)

Asin: B000116N9A
Canada | United Kingdom | Germany | France | Japan

57. Hash tables in PRAM and VLSI models (Technical report / Dipartimento di informatica, Università di Pisa)
by Fabrizio Luccio
 Unknown Binding: 7 Pages (1989)

Asin: B0007BOOHC
Canada | United Kingdom | Germany | France | Japan

58. Parallel access to hash tables (Technical report / Dipartimento di informatica, Università di Pisa)
by Fabrizio Luccio
 Unknown Binding: 10 Pages (1989)

Asin: B0007BOOF4
Canada | United Kingdom | Germany | France | Japan

59. A new method for generating minimal perfect hash functions
by Thomas J Sager
 Unknown Binding: Pages (1984)

Asin: B00071MRJY
Canada | United Kingdom | Germany | France | Japan

60. Rationale for bit fixing in the MDC-2 algorithm (Research report RC. International Business Machines Corporation. Research Division)
by Don Coppersmith
 Unknown Binding: 7 Pages (1999)

Asin: B0006R8A1S
Canada | United Kingdom | Germany | France | Japan

  Back | 41-60 of 72 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

site stats