• Ebook Tự học lập trình hướng đối tượng và lập trình CSDL C#: Phần 1 - NXB Giao thông Vận tải

    Ebook Tự học lập trình hướng đối tượng và lập trình CSDL C#: Phần 1 - NXB Giao thông Vận tải

    Tập sách “Tự học lập trình hướng đối tượng và lập trình cơ sở dữ liệu visual C#" qua các chương trình mẫu sao cho thật ngắn gọn và dễ hiểu. Nội dung của tập sách sẽ hướng dẫn các bạn lập trình hướng đối tượng căn bản qua các bài tập mẫu, lập trình dùng CSDL Access 2003, lập trình dùng CSDL SQL Server 2000 theo hai cách, tự thiết kế hoặc...

     131 p hiu 27/08/2019 319 33

  • Ebook Tự học lập trình hướng đối tượng và lập trình CSDL C#: Phần 2 - NXB Giao thông Vận tải

    Ebook Tự học lập trình hướng đối tượng và lập trình CSDL C#: Phần 2 - NXB Giao thông Vận tải

    Tiếp nối phần 1, phần 2 sách tiếp tục chia sẻ 2 nôi dung cuối của sách đó là: Lập trình visual C# dùng cơ sở dữ liệu Access 2003. Vài nét về Access; lập trình visual C# dùng cơ sở dữ liệu SQL SEVER 2000, cách cài đặt SQL SEVER 2000. Nghiên cứu tập sách này, chắc chắn các bạn sẽ cảm thấy hài lòng, những kiến thức hướng dẫn trong các chương trình mẫu...

     265 p hiu 27/08/2019 278 30

  • Ebook CEH - TM - Official certified ethical hacker review guide: Part 1

    Ebook CEH - TM - Official certified ethical hacker review guide: Part 1

    Part 1 book "CEH - TM - Official certified ethical hacker review guide" has contents: Introduction to ethical hacking, ethics, and legality; footprinting and social engineering; scanning and enumeration; trojans, backdoors, viruses, and worms; trojans, backdoors, viruses, and worms.

     133 p hiu 27/08/2019 61 0

  • Ebook CEH - TM - Official certified ethical hacker review guide: Part 2

    Ebook CEH - TM - Official certified ethical hacker review guide: Part 2

    Part 2 book "CEH - TM - Official certified ethical hacker review guide" has contents: Sniffers, denial of service and session hijacking; hacking web servers, web application vulnerabilities, and web based password cracking techniques; SQL injection and buffer overflows; wireless hacking; physical security,...and other contents.

     132 p hiu 27/08/2019 64 0

  • Ebook Cryptography engineering: Part 2

    Ebook Cryptography engineering: Part 2

    Part 2 book "Cryptography engineering" has contents: Primes, Diffie-Hellman, introduction to cryptographic protocols, key negotiation, implementation issue, the clock, key servers, the dream of PKi, storing secrets, storing secrets,... and other contents.

     191 p hiu 26/08/2019 87 0

  • Ebook Cryptography engineering: Part 1

    Ebook Cryptography engineering: Part 1

    (BQ) Part 1 book "Cryptography engineering" has contents: The context of cryptography, introduction to cryptography, block ciphers, block cipher modes, hash functions, message authentication codes, the secure channel, implementation issues, implementation issues.

     191 p hiu 26/08/2019 88 0

  • Ebook Introduction to modern cryptography: Part 1

    Ebook Introduction to modern cryptography: Part 1

    (BQ) Part 1 book "Introduction to modern cryptography" has contents: Introduction and classical cryptography, perfectly secret encryption; message authentication codes and collision resistant hash functions, practical constructions of pseudorandom permutations,...and other contents.

     259 p hiu 26/08/2019 120 1

  • Ebook Introduction to modern cryptography: Part 2

    Ebook Introduction to modern cryptography: Part 2

    (BQ) Part 2 book "Introduction to modern cryptography" has contents: Number theory and cryptographic hardness assumptions, factoring and computing discrete logarithms, private key management and the public key revolution, digital signature schemes,....and other contents.

     294 p hiu 26/08/2019 128 1

  • Ebook Understanding cryptography

    Ebook Understanding cryptography

    Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. This book addresses this issue by providing a...

     382 p hiu 26/08/2019 94 0

  • Ebook Big data now: Current perspectives from O'aReilly Radar

    Ebook Big data now: Current perspectives from O'aReilly Radar

    This book is provided in digital form with the permission of the rightsholder as part of a. Google project to make the world's books discoverable online. The application of data: products and processes – A “data product” can emerge from virtually any domain, including everything from data startups to established enterprises to media/journalism to education and research. Take a closer look at the actions connected to data -- the finding,...

     137 p hiu 26/08/2019 91 1

  • Ebook Hacking exposed: Network security secrets and solutions (Third edition)

    Ebook Hacking exposed: Network security secrets and solutions (Third edition)

    (BQ)Typically, these actors attempt to exploit flaws in the system implementation or its deployment in order to obtain information, acquire access to services, or simply to disrupt the operation of the cloud through loss of system availability or system and information integrity. As the description of these attacks implies some of these attacks violate the tenant boundaries and hardware abstraction layers that VMware vCloud Director attempts...

     260 p hiu 26/08/2019 98 0

  • Ebook Network Security Essentials: Applications and Standards (4th Edition) - William Stallings

    Ebook Network Security Essentials: Applications and Standards (4th Edition) - William Stallings

    (BQ) Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition.

     432 p hiu 26/08/2019 84 0





Hướng dẫn khai thác thư viện số

Hổ trợ trực tuyến

Yahoo Messenger

Trương Minh Hoài

Email: hoaitm@hiu.vn

ĐT: 0938084083

getDocumentFilter3 p_strSchoolCode=hbu