Linear Network Error Correction Coding

Linear Network Error Correction Coding

(1 reviews, 322 downloads)
, 2014-04-02, 107 pages, pdf, epub
There are two main approaches in the theory of network error correction coding. In this SpringerBrief, the authors summarize some of the most important contributions following the classic approach, which represents messages by sequences similar to algebraic coding, and also briefly discuss…
Using Social Media in Libraries: Best Practices

Using Social Media in Libraries: Best Practices

(1 reviews, 239 downloads)
, 2013-02-15, 114 pages, pdf, epub
Since there’s no point in Twittering if no one acts on your tweets and there’s no point in having a Facebook page with a million “likes” if library use doesn’t increase, you’ll welcome the eight best practices presented here because…
The Hacker Playbook: Practical Guide To Penetration Testing

The Hacker Playbook: Practical Guide To Penetration Testing

(10 reviews, 1068 downloads)
, 2014-03-13, 294 pages, pdf, epub
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional…
Todd Lammle's CCNA/CCENT IOS Commands Survival Guide, 2nd Edition

Todd Lammle’s CCNA/CCENT IOS Commands Survival Guide, 2nd Edition

(1 reviews, 691 downloads)
, 2014-02-24, 264 pages, pdf, epub
Todd Lammle’s CCNA/CCENT IOS Commands Survival Guide: Exams 100-101, 200-101, and 200-120 Your Guide to CCENT and CCNA IOS Commands This book is an ideal supplement to Todd Lammle’s CCENT and CCNA Study Guides, and a great quick reference for…
Cryptography and Network Security: Principles and Practice, 6th Edition

Cryptography and Network Security: Principles and Practice, 6th Edition

(6 reviews, 895 downloads)
, 2013-03-16, 752 pages, pdf, epub
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and network security and…