๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Lattices applied to Coding for Reliable and Secure Communications

โœ Scribed by Sueli I.R. Costa et al.


Publisher
Springer
Year
2017
Tongue
English
Leaves
120
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Java Coding Guidelines: 75 Recommendatio
โœ Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

Organizations worldwide rely on Java code to perform mission-critical tasks, and therefore that code must be reliable, robust, fast, maintainable, and secure.ย Javaโ„ข Coding Guidelines brings together expert guidelines, recommendations, and code examples to help you meet these demands. Youโ€™ll find 75

Java Coding Guidelines 75 Recommendatio
โœ Fred Long, Dhruv Mohindra, Robert C. Seacord ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Addison-Wesley Professional ๐ŸŒ English

Organizations worldwide rely on Java code to perform mission-critical tasks, and therefore that code must be reliable, robust, fast, maintainable, and secure.ย Javaโ„ข Coding Guidelines brings together expert guidelines, recommendations, and code examples to help you meet these demands. Youโ€™ll find 75

Building Secure and Reliable Network App
โœ Kenneth P Birman ๐Ÿ“‚ Library ๐Ÿ“… 1996 ๐Ÿ› Manning Publications ๐ŸŒ English

As the 'network is the computer' slogan becomes reality so reliability and security of networked applications become more important. Not only are hospitals, air traffic control systems, and telephone systems becoming more networked, but business applications are increasingly based on the open world

Secure Development for Mobile Apps: How
โœ J. D. Glaser ๐Ÿ“‚ Library ๐Ÿ“… 2014 ๐Ÿ› Auerbach Publications ๐ŸŒ English

The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices now containing confidential business, financial, and personal information. This has led to a greater focus on mobile software security.<br>Establishing mobile software