|
Books > Academic & Education > Professional & Technical
This book has been written to help digital engineers who need a few
basic analog tools in their toolbox. For practicing digital
engineers, students, educators and hands-on managers who are
looking for the analog foundation they need to handle their daily
engineering problems, this will serve as a valuable reference to
the nuts-and-bolts of system analog design in a digital world.
This book is a hands-on designer's guide to the most important
topics in analog electronics-such as Analog-to-Digital and
Digital-to-Analog conversion, operational amplifiers, filters, and
integrating analog and digital systems. The presentation is
tailored for engineers who are primarily experienced and/or
educated in digital circuit design. This book will teach such
readers how to "think analog" when it is the best solution to their
problem. Special attention is also given to fundamental topics,
such as noise and how to use analog test and measurement equipment,
that are often ignored in other analog titles aimed at professional
engineers.
* Extensive use of case-histories and real design examples.
* Offers digital designers the right analog "tool" for the job at
hand.
* Conversational, annecdotal "tone" is very easily accessible by
students and practitioners alike.
The past few years have seen significant change in the landscape of
high-end network processing. In response to the formidable
challenges facing this emerging field, the editors of this series
set out to survey the latest research and practices in the design,
programming, and use of network processors.
Through chapters on hardware, software, performance and modeling,
Volume 3 illustrates the potential for new NP applications, helping
to lay a theoretical foundation for the architecture, evaluation,
and programming of networking processors.
Like Volume 2 of the series, Volume 3 further shifts the focus from
achieving higher levels of packet processing performance to
addressing other critical factors such as ease of programming,
application developments, power, and performance prediction. In
addition, Volume 3 emphasizes forward-looking, leading-edge
research in the areas of architecture, tools and techniques, and
applications such as high-speed intrusion detection and prevention
system design, and the implementation of new interconnect
standards.
*Investigates current applications of network processor technology
at Intel; Infineon Technologies; and NetModule.
Presents current research in network processor design in three
distinct areas:
*Architecture at Washington University, St. Louis; Oregon Health
and Science University; University of Georgia; and North Carolina
State University.
*Tools and Techniques at University of Texas, Austin; Academy of
Sciences, China; University of Paderborn, Germany; and University
of Massachusetts, Amherst.
*Applications at University of California, Berkeley; Universidad
Complutense de Madrid, Spain; ETH Zurich, Switzerland; Georgia
Institute of Technology; Vrije Universiteit, the Netherlands; and
Universiteit Leiden, the Netherlands.
Fixtures--the component or assembly that holds a part undergoing
machining--must be designed to fit the shape of that part and the
type of machining being done. This book discusses the fundamentals
of Computer-Aided Fixture Design (CAFD) techniques and covers
fixture planning, fixture design (both modular and dedicated
fixtures), fixture design verifications, and the overall
integration with CAD/CAM. The book shows how CAFD may lead to a
significant reduction of product and process development time and
production cost, and how CAFD can increase quality assurance
through simulation and science-based technical specification and
cost estimation in business quoting, especially in current
supplier-based manufacturing. It also provides case study examples.
* This book provides a total solution of CAFD, including planning,
design, and design verification
* Practical and comprehensive theoretical analysis of fixturing
from real industrial application projects
* Introduces the integration of fixture design and analysis with
CAD/CAM so that detailed geometric information can be processed and
complex fixture designs can be designed and analyzed
Annual Reports in Medicinal Chemistry continues to focus on
providing timely and critical reviews of important topics in
medicinal chemistry together with an emphasis on emerging topics in
the biological sciences, which are expected to provide the basis
for entirely new future therapies.
Sections I-IV are disease orientated and generally report on
specific medicinal agents.
Sections V and VI continue to emphasize important topics in
medicinal chemistry, biology, and drug design.
* Annual comprehensive reviews of the past year literature in many
topics of interest to medicinal chemists
* Includes a comprehensive set of indices to easily locate topics
in Volumes 1-38 of this series
* Provides critical review on hot topics in medicinal chemistry
Most Perl programmers were originally trained as C and Unix
programmers, so the Perl programs that they write bear a strong
resemblance to C programs. However, Perl incorporates many features
that have their roots in other languages such as Lisp. These
advanced features are not well understood and are rarely used by
most Perl programmers, but they are very powerful. They can
automate tasks in everyday programming that are difficult to solve
in any other way. One of the most powerful of these techniques is
writing functions that manufacture or modify other functions. For
example, instead of writing ten similar functions, a programmer can
write a general pattern or framework that can then create the
functions as needed according to the pattern. For several years
Mark Jason Dominus has worked to apply functional programming
techniques to Perl. Now Mark brings these flexible programming
methods that he has successfully taught in numerous tutorials and
training sessions to a wider audience.
* Introduces powerful programming methods--new to most Perl
programmers--that were previously the domain of computer
scientists
* Gradually builds up confidence by describing techniques of
progressive sophistication
* Shows how to improve everyday programs and includes numerous
engaging code examples to illustrate the methods
In reaction to the continually changing business climate companies
develop many business strategies to increase their competitiveness
and improve profitability. Companies regularly reshape themselves
continually exploring new markets and developing new products. When
they can't expand into new markets or develop new products on their
own, they seek alternatives. These alternatives include merging
with or acquiring other companies to create a single more capable
company. Companies acquire other companies for a wide variety of
reasons. In some cases company survival may actually be the reason.
What does this condition mean to the security professional? In the
course of mergers and acquisitions, security plays a vital role in
helping to make the endeavor successful. There are numerous titles
on the business aspects of M&A such as the ones listed below.
However, this unique book focuses on the role security plays in
helping to make a merger, acquisition or divestiture successful. It
addresses the fundamental security elements that are required to
support the effort. In addition, it provides an integrated "how to"
approach to implementing M&A security complete with methods and
processes that have been quickly and cost-effectively implemented.
- First book available that focuses on the role of the Security
Manager in M&A
- Case studies that highlight the role of the security manager;
cases include both best practices as well as illustrations of
nightmare examples of what NOT to do
- Lead author is an expert that has participated in/managed
security for more than 20 high-profile and large-scale acquisitions
- Model processes, procedures, checklists, charts and sample forms
all serve to ease immediate analysis and implementation in a merger
or acquisition
This book contains everything you need to make your application
program support IPv6. IPv6 socket APIs (RFC2553) are fully
described with real-world examples. It covers security, a great
concern these days. To secure the Internet infrastructure, every
developer has to take a security stance - to audit every line of
code, to use proper API and write correct and secure code as much
as possible. To achieve this goal, the examples presented in this
book are implemented with a security stance. Also, the book leads
you to write secure programs. For instance, the book recommends
against the use of some of the IPv6 standard APIs - unfortunately,
there are some IPv6 APIs that are inherently insecure, so the book
tries to avoid (and discourage) the use of such APIs. Another key
issue is portability. The examples in the book should be applicable
to any of UNIX based operating systems, MacOS X, and Windows XP.
* Covers the new protocol just adopted by the Dept of Defense for
future systems
* Deals with security concerns, including spam and email, by
presenting the best programming standards
* Fully describes IPv6 socket APIs (RFC2553) using real-world
examples
* Allows for portability to UNIX-based operating systems, MacOS X,
and Windows XP
The book deals with both the abstract and practical aspects of
moving from a univerisity laboratory to a position in the biotech
industry. Each chapter lists common and unique features to evaluate
breaking down complex decisions into manageable elements. Several
sections provide "how to" guides for the preparation of
manuscripts, patents, grants, and internal company documents.
*Written by an experienced academician and successful biotechnology
entrepreneur
*Reviews the basic tools taught in a traditional university
*Identifies new ways these these tools will be used in the
corporate world
*Details the 'nuts and bolts' necessary to negotiate a successful
position in the biotech industry
Richard Munden demonstrates how to create and use simulation models
for verifying ASIC and FPGA designs and board-level designs that
use off-the-shelf digital components. Based on the VHDL/VITAL
standard, these models include timing constraints and propagation
delays that are required for accurate verification of today s
digital designs.
ASIC and FPGA Verification: A Guide to Component Modeling expertly
illustrates how ASICs and FPGAs can be verified in the larger
context of a board or a system. It is a valuable resource for any
designer who simulates multi-chip digital designs.
*Provides numerous models and a clearly defined methodology for
performing board-level simulation.
*Covers the details of modeling for verification of both logic and
timing.
*First book to collect and teach techniques for using VHDL to model
"off-the-shelf" or "IP" digital components for use in FPGA and
board-level design verification.
This revised and updated 3rd edition outlines the structure of the
global industry and future trends, highlights issues facing the
industrial valve industry, assesses market and technological
trends, offers market figures and forecasts to 2009 and identifies
the major players.
The report also provides a detailed overview of merger and
acquisition activity in the industrial valve industry since 2000.
In this practical reference, popular author Lewin Edwards shows how
to develop robust, dependable real-time systems for robotics and
other control applications, using open-source tools. It
demonstrates efficient and low-cost embedded hardware and software
design techniques, based on Linux as the development platform and
operating system and the Atmel AVR as the primary microcontroller.
The book provides comprehensive examples of sensor, actuator and
control applications and circuits, along with source code for a
number of projects. It walks the reader through the process of
setting up the Linux-based controller, from creating a custom
kernel to customizing the BIOS, to implementing graphical control
interfaces.
Including detailed design information on:
-ESBUS PC-host interface
-Host-module communications protocol
-A speed-controlled DC motor with tach feedback and thermal
cut-off
-A stepper motor controller
-A two-axis attitude sensor using a MEMS accelerometer
-Infrared remote control in Linux using LIRC
-Machine vision using Video4Linux
The Accompanying CD-ROM contains a wealth of design materials,
including:
-Full schematics and source code for the projects described
-Ready-made disk images for the miniature Linux distribution uses
as the basis for the PC-side software
-Distribution archives of source code for all GNU software used,
along with application-specific patches where appropriate
-A free version of the schematic capture and PCB CAD software
used
-Atmel AVR Studio
* The first-ever book on using open source technology for robotics
design!
* Immensely valuable source code and design tools provided on the
CD-ROM
* Covershot topics such as GPS navigation, 3-D sensing, and machine
vision, all using a Linux platform!
Finally, here is a single volume containing all of the engineering
information needed to successfully design and implement any type of
wireless network Author Dan Dobkin covers every aspect of RF
engineering necessary for wireless networks. He begins with a
review of essential math and electromagnetic theory followed by
thorough discussions of multiplexing, modulation types, bandwidth,
link budgets, network concepts, radio system architectures, RF
amplifiers, mixers and frequency conversion, filters, single-chip
radio systems, antenna theory and designs, signal propagation, as
well as planning and implementing wireless networks for both indoor
and outdoor environments.
The appendices contain such vital data as U.S., European, and
Japanese technical and regulatory standards for wireless networks,
measurements in wireless networks, reflection and matching of
transmission lines, determining power density, and much more. The
accompanying companion website includes useful software tools such
as a link budget calculator, a Smith Chart calculator and plotter,
and radio chain analysis utilities. No matter what type of wireless
network you design-Bluetooth, UWB, or even metropolitan area
network (MAN)-this book is the one reference you can t do without
. The A-to-Z guide to wireless network engineering covers
everything from basic electromagnetic theory to modulation
techniques to network planning and implementation
. Engineering and design principles covered are applicable to any
type of wireless network, including 802.11, 802.16, 802.20, and
Bluetooth.
. Discusses state-of-the-art modulation techniques such as ultra
wideband (UWB) and orthogonal frequency-division multiplexing
(OFDM)."
In designing a network device, you make dozens of decisions that
affect the speed with which it will perform sometimes for better,
but sometimes for worse. Network Algorithmics provides a complete,
coherent methodology for maximizing speed while meeting your other
design goals.
Author George Varghese begins by laying out the implementation
bottlenecks that are most often encountered at four disparate
levels of implementation: protocol, OS, hardware, and architecture.
He then derives 15 solid principles ranging from the commonly
recognized to the groundbreaking that are key to breaking these
bottlenecks.
The rest of the book is devoted to a systematic application of
these principles to bottlenecks found specifically in endnodes,
interconnect devices, and specialty functions such as security and
measurement that can be located anywhere along the network. This
immensely practical, clearly presented information will benefit
anyone involved with network implementation, as well as students
who have made this work their goal.
FOR INSTRUCTORS: To obtain access to the solutions manual for this
title simply register on our textbook website
(textbooks.elsevier.com)and request access to the Computer Science
subject area. Once approved (usually within one business day) you
will be able to access all of the instructor-only materials through
the "Instructor Manual" link on this book's academic web page at
textbooks.elsevier.com.
. Addresses the bottlenecks found in all kinds of network devices,
(data copying, control transfer, demultiplexing, timers, and more)
and offers ways to break them.
. Presents techniques suitable specifically for endnodes, including
Web servers.
. Presents techniques suitable specifically for interconnect
devices, including routers, bridges, and gateways.
. Written as a practical guide for implementers but full of
valuable insights for students, teachers, and researchers.
. Includes end-of-chapter summaries and exercises."
An in-depth look at real analysis and its applications, including
an introduction to wavelet
analysis, a popular topic in "applied real analysis." This text
makes a very natural connection between the classic pure analysis
and the applied topics, including measure theory, Lebesgue
Integral,
harmonic analysis and wavelet theory with many associated
applications.
*The text is relatively elementary at the start, but the level of
difficulty steadily increases
*The book contains many clear, detailed examples, case studies and
exercises
*Many real world applications relating to measure theory and pure
analysis
*Introduction to wavelet analysis
The goal of this book is to present and compare various options one
for systems architecture from two separate points of view. One,
that of the information technology decision-maker who must choose a
solution matching company business requirements, and secondly that
of the systems architect who finds himself between the rock of
changes in hardware and software technologies and the hard place of
changing business needs.
Different aspects of server architecture are presented, from
databases designed for parallel architectures to high-availability
systems, and touching en route on often- neglected performance
aspects.
1. The book provides IT managers, decision makers and project
leaders who want to acquire knowledge sufficient to understand the
choices made in and capabilities of systems offered by various
vendors:
2. Provides system design information to balance the characteristic
applications against the capabilities and nature of various
architectural choices
3. In addition, it offers an integrated view of the concepts in
server architecture, accompanied by discussion of effects on the
evolution of the data processing industry.
Recent government publications like "Benchmarks for Scientific
Literacy" and "Science for all Americans" have given teachers a
mandate for improving science education in America. What we know
about how learners construct meaning--particularly in the natural
sciences--has undergone a virtual revolution in the past 25 years.
Teachers, as well as researchers, are now grappling with how to
better teach science, as well as how to assess whether students are
learning. Assessing Science Understanding is a companion volume to
Teaching Science for Understanding, and explores how to assess
whether learning has taken place. The book discusses a range of
promising new and practical tools for assessment including concept
maps, vee diagrams, clinical interviews, problem sets,
performance-based assessments, computer-based methods, visual and
observational testing, portfolios, explanatory models, and national
examinations.
Today s control system designers face an ever-increasing need for
speed and accuracy in their system measurements and computations.
New design approaches using microcontrollers and DSP are emerging,
and designers must understand these new approaches, the tools
available, and how best to apply them.
This practical text covers the latest techniques in
microcontroller-based control system design, making use of the
popular MSP430 microcontroller from Texas Instruments.
The book covers all the circuits of the system, including:
.Sensors and their output signals
.Design and application of signal conditioning circuits
.A-to-D and D-to-A circuit design
.Operation and application of the powerful and popular TI MSP430
microcontroller
.Data transmission circuits
.System power control circuitry
Written by an experienced microcontroller engineer and textbook
author, the book is lavishly illustrated and includes numerous
specific circuit design examples, including a fully tested and
documented hands-on project using the MSP430 that makes use of the
principles described. For students, engineers, technicians, and
hobbyists, this practical text provides the answers you need to
design modern control systems quickly and easily.
* Seasoned Texas Instruments designer provides a ground-up
perspective on embedded control systems
* Pedagogical style provides a self-learning approach with
examples, quizzes and review features
* Accompanying companion website contains source code and more "
Trojans, Worms, and Spyware provides practical, easy to understand,
and readily usable advice to help organizations to improve their
security and reduce the possible risks of malicious code attacks.
Despite the global downturn, information systems security remains
one of the more in-demand professions in the world today. With the
widespread use of the Internet as a business tool, more emphasis is
being placed on information security than ever before. To
successfully deal with this increase in dependence and the ever
growing threat of virus and worm attacks, Information security and
information assurance (IA) professionals need a jargon-free book
that addresses the practical aspects of meeting new security
requirements.
This book provides a comprehensive list of threats, an explanation
of what they are and how they wreak havoc with systems, as well as
a set of rules-to-live-by along with a system to develop procedures
and implement security training. It is a daunting task to combat
the new generation of computer security threats - new and advanced
variants of Trojans, as well as spyware (both hardware and
software) and "bombs" - and Trojans, Worms, and Spyware will be a
handy must-have reference for the computer security professional to
battle and prevent financial and operational harm from system
attacks.
*Provides step-by-step instructions to follow in the event of an
attack
*Case studies illustrate the "do's," "don'ts," and lessons learned
from infamous attacks
*Illustrates to managers and their staffs the importance of having
protocols and a response plan in place
The text is for a two semester course in advanced calculus. It
develops the basic ideas of calculus rigorously but with an eye to
showing how mathematics connects with other areas of science and
engineering. In particular, effective numerical computation is
developed as an important aspect of mathematical analysis.
* Maintains a rigorous presentation of the main ideas of advanced
calculus, interspersed with applications that show how to analyze
real problems
* Includes a wide range of examples and exercises drawn from
mechanics, biology, chemical engineering and economics
* Describes links to numerical analysis and provides opportunities
for computation; some MATLAB
codes are available on the author's webpage
* Enhanced by an informal and lively writing style
Digital Signal Processing has undergone enormous growth in
usage/implementation in the last 20 years and many engineering
schools are now offering real-time DSP courses in their
undergraduate curricula. Our everyday lives involve the use of DSP
systems in things such as cell phones and high-speed modems; Texas
Instruments has introduced the TMS320C6000 DSP processor family to
meet the high performance demands of today s signal processing
applications.
This book provides the know-how for the implementation and
optimization of computationally intensive signal processing
algorithms on the Texas Instruments family of TMS320C6000 DSP
processors. It is organized in such a way that it can be used as
the textbook for DSP lab courses offered at many engineering
schools or as a self-study/reference for those familiar with DSP
but not this family of processors.
This book provides a restructured, modified, and condensed version
of the information in more than twenty TI manuals so that one can
learn real-time DSP implementations on the C6000 family in a
structured course, within one semester. Each chapter is followed by
an appropriate lab exercise to provide the hands-on lab material
for implementing appropriate signal processing
functions. These labs are included on the accompanying companion
website to take the reader through the entire process of C6X code
writing.
* Each chapter is followed by an appropriate lab exercise
* Provides the hands-on lab material for implementing appropriate
signal processing functions
* Labs are included on accompanying companion website taking the
reader through the entire process of C6X code writing"
Science and engineering students depend heavily on concepts of
mathematical modeling. In an age where almost everything is done on
a computer, author Clive Dym believes that students need to
understand and "own" the underlying mathematics that computers are
doing on their behalf. His goal for Principles of Mathematical
Modeling, Second Edition, is to engage the student reader in
developing a foundational understanding of the subject that will
serve them well into their careers.
The first half of the book begins with a clearly defined set of
modeling principles, and then introduces a set of foundational
tools including dimensional analysis, scaling techniques, and
approximation and validation techniques. The second half
demonstrates the latest applications for these tools to a broad
variety of subjects, including exponential growth and decay in
fields ranging from biology to economics, traffic flow, free and
forced vibration of mechanical and other systems, and optimization
problems in biology, structures, and social decision making.
Prospective students should have already completed courses in
elementary algebra, trigonometry, and first-year calculus and have
some familiarity with differential equations and basic
physics.
* Serves as an introductory text on the development and application
of mathematical models
* Focuses on techniques of particular interest to engineers,
scientists, and others who model continuous systems
* Offers more than 360 problems, providing ample opportunities for
practice
* Covers a wide range of interdisciplinary topics--from engineering
to economics to the sciences
* Uses straightforward language and explanations that make modeling
easy to understand and apply
New to this Edition:
* A more systematic approach to mathematical modeling, outlining
ten specific principles
* Expanded and reorganized chapters that flow in an increasing
level of complexity
* Several new problems and updated applications
* Expanded figure captions that provide more information
* Improved accessibility and flexibility for teaching
While many architects use PHP for projects, they are often not
aware of the power of PHP in creating enterprise-level
applications. This book covers the latest version of PHP - version
5 -- and focuses on its capabilities within a multi-tier
application framework. It contains numerous coding samples and
commentaries on them. A chapter discusses object orientation in PHP
as it applies to the multi-tier architecture and other chapters
discuss HTTP and SOAP, the two communication protocols most useful
in tying together multiple layers. There is also coverage of
database design and query construction as well as information about
tricks you can use in generating user interfaces.
-Covers PHP as it relates to developing software in a multi-tier
environment-a crucial aspect of developing robust software with low
cost and ease of use as design goals.
-Makes extensive use of Simple Object Access Protocol (SOAP) and
Web Services as implemented in PHP and NuSOAP.
-Shows precisely how to make use of the InnoDB table type newly
available in MySQL. InnoDB supports true referential integrity and
row-level locking.
-An application example (a multi-currency bookkeeping application)
runs throughout the book, showing various PHP capabilities as well
as the database interaction.
-An accompanying web site includes the source code for all of the
examples and the sample download.
XML in Data Management is for IT managers and technical staff
involved in the creation, administration, or maintenance of a data
management infrastructure that includes XML. For most IT staff, XML
is either just a buzzword that is ignored or a silver bullet to be
used in every nook and cranny of their organization. The truth is
in between the two. This book provides the guidance necessary for
data managers to make measured decisions about XML within their
organizations. Readers will understand the uses of XML, its
component architecture, its strategic implications, and how these
apply to data management.
To view a sample chapter and read the Foreword by Thomas C. Redman,
visit http: //books.elsevier.com/mk/?isbn=0120455994
* Takes a data-centric view of XML.
* Explains how, when, and why to apply XML to data management
systems.
* Covers XML component architecture, data engineering, frameworks,
metadata, legacy systems, and more.
* Discusses the various strengths and weaknesses of XML
technologies in the context of organizational data management and
integration.
Accelerated Testing and Validation Methods is a cross-disciplinary
guide that describes testing and validation tools and techniques
throughout the product development process. Alex Porter not only
focuses on what information is needed but also on what tools can
produce the information in a timely manner. From the information
provided, engineers and managers can determine what data is needed
from a test and validation program and then how to select the best,
most effective methods for obtaining the data.
This book integrates testing and validation methods with a business
perspective so readers can understand when, where, and how such
methods can be economically justified. Testing and validation is
about generating key information at the correct time so that sound
business and engineering decisions can be made. Rather than simply
describing various testing and validation techniques, the author
offers readers guidance on how to select the best tools for a
particular need, explains the appropriateness of different
techniques to various situations and shows how to deploy them to
ensure the desired information is accurately gathered.
* Emphasizes developing a strategy for testing and validation
* Companion website includes example spreadsheets, program source
code, case studies, video clips and much more
* Teaches how to design a testing and validation program that
deliver information in a timely and cost-effective manner
For a long time, there has been a need for a practical,
down-to-earth developers book for the Java Cryptography Extension.
I am very happy to see there is now a book that can answer many of
the technical questions that developers, managers, and researchers
have about such a critical topic. I am sure that this book will
contribute greatly to the success of securing Java applications and
deployments for e-business. --Anthony Nadalin, Java Security Lead
Architect, IBM
For many Java developers and software engineers, cryptography is an
"on-demand" programming exercise, where cryptographic concepts are
shelved until the next project requires renewed focus. But
considerations for cryptography must be made early on in the design
process and it s imperative that developers know what kinds of
solutions exist.
One of Java s solutions to help bridge the gap between academic
research and real-world problem solving comes in the form of a
well-defined architecture for implementing cryptographic solutions.
However, to use the architecture and its extensions, it is
important to recognize the pros and cons of different cryptographic
algorithms and to know how to implement various devices like key
agreements, digital signatures, and message digests, to name a few.
In Java Cryptography Extensions (JCE), cryptography is discussed at
the level that developers need to know to work with the JCE and
with their own applications but that doesn t overwhelm by packing
in details unimportant to the busy professional. The JCE is
explored using numerous code examples and instructional detail,
with clearly presented sections on each aspect of the Java library.
An online open-source cryptography toolkit and the code for all of
the examples further reinforces the concepts covered within the
book. No other resource presents so concisely or effectively the
exact material needed to begin utilizing the JCE.
* Written by a seasoned veteran of both cryptography and
server-side programming
* Covers the architecture of the JCE, symmetric ciphers, asymmetric
ciphers, message digests, message authentication codes, digital
signatures, and managing keys and certificates
* Includes a companion web site that contains the code for the
examples in the book, open-source cryptographic toolkits, and
further resources"
|
|