-
-
Iqtisodiyot. Iqtisodiyot fanlari
-
Handbook of Applied Cryptography
This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material. It also provides a comprehensive source from which to learn cryptography, serving both students and instructors. In addition, the rigorous treatment, breadth, and extensive bibliographic material should make it an important reference for research professionals. Our goal was to assimilate the existing cryptographic knowledge of industrial interest into one consistent, self-contained volume accessible to engineers in practice, to computer scientists and mathematicians in academia, and to motivated non-specialists with a strong desire to learn cryptography.
-
Introduction to Modern Cryptography (Second Ed.)
The goal of our book remains the same as in the first edition: to present the basic paradigms and principles of modern cryptography to a general audience with a basic mathematics background. We have designed this book to serve as a textbook for undergraduate- or graduate-level courses in cryptography (in computer science, electrical engineering, or mathematics departments), as a general introduction suitable for self-study (especially for beginning graduate students), and as a reference for students, researchers, and practitioners.
-
Second Edition Skillful 4. Listening and Speaking. Digital Student's book pack
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.
-
Introduction to Computational Thinking. Problem Solving, Algorithms, Data Structures, and More
computation is done and how you can make computation efficient. Still, from time to time, I will show you tricks for making your programming efficient as well, meaning speeding up how fast you can write your programs, which is a separate issue from how efficient your programs are once you have implemented them. These tricks are generally applicable, provided your programming language supports the features we use, and for a working programmer, efficient programming is as important as efficient programs. I won't cover these tricks as separate topics, but show them when we study topics where they are useful.
-
O language hub B1+. Intermediate student's book
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.
-
Переходные электромеханические процессы в электрических системах
В книге рассматриваются переходные режимы электроэнергетических систем, имеющих автоматическое регулирование.
-
Bulding a Secure Computer System
This book is for the practicing computer professional who wants to understand—and perhaps implement—technical solutions to computer security problems. It covers the state of the art of applied computer security technology developed over the last fifteen or twenty years. It is a guide to building systems, not an exhaustive academic study, and provides enough information about selected techniques to give you a well-rounded understanding of the problems and solutions. It is not possible in one book to treat all applications of security while retaining the technical depth needed to cover each topic adequately. I have concentrated on applications for which prevailing literature is weak: operating systems, hardware architecture, networks, and practical verification. Subjects about which books are already available, such as database security and cryptographic algorithms, receive less discussion here.
-
Second Edition Skillful 4. Reading and Writing digital student's book pack
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.
-
Cryptographic Protocol. Security Analysis Based on Trusted Freshness
A network protocol is a formal description of digital message formats, and of the rules for exchanging those messages in or between computing systems. A cryptographic protocol (also called a security protocol) is a kind of special network protocol that performs a security-related function and applies cryptographic methods. Network protocols are typically developed in layers, with each layer responsible for a different aspect of communication; the security mechanisms are therefore embedded in layers. For instance, Transport Layer Security (TLS) is a well-known cryptographic protocol proposed for adding security services to TCP. In fact, cryptographic protocols are widely used for key establishment, entity authentication, message authentication, and secure data transport, or non-repudiation methods. Due to the asynchronous nature of communication, although there are only a few messages in a cryptographic protocol, the protocol may not be as secure as intended. For example, the Needham-Schroeder public-key authentication protocol was found to be flawed in 1995, seventeen years after its publication.
-
Основы изучения и прогнозирования спроса на бытовые услуги
В учебнике рассматривается содержание основопологающих для данной сферы потребления экономических категорий. Отражены специфические особенности спроса и потребления бытовых услуг.
-
Open Mind intermediate student's book pack
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.
-
Destination B2 Grammar and Vocabulary
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.
-
Техническая термодинамика
Наряду с обычными для таких учебников разделами об основных законах термодинамики и вытекающих из них общих теоретических положениях, которые составляют основы для анализа рабочих циклов тепловых двигателей и холодильных машин, изложен ряд вопросов, представляющих интерес в связи с новыми достижениями в области термодинамики, теплофизики и энергетики.
-
Second edition Skillful 2 reading writing digital student's book pack
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.
-
Falsafa
Mazkur darslik ta'lim jarayonining falsafiy mazmun mohiyati, talabalarda tanqidiy fikrlash ko'nikmalarini rivojlantirish va ularni turli falsafiy yondoshuvlar bilan tanishtirishga qaratilgan.
-
Open Mind Advanced student's Book premium Pack
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.