-
-
-
-
Iqtisodiyot. Iqtisodiyot fanlari
-
Adabiyot. Adabiyotshunoslik. Xalq og‘zaki ijodiyoti
-
Фалсафа асослари
Ушбу дарсликда фалсафанинг умумназарий масалалари, унинг мантиқ, этика ва эстетикага доир йўналишлари, жамият, инсон, қадриятлар фалсафаси ва коррупцияга қарши кураш асослари бўйича умумий маълумотлар, ушбу соҳадаги қонунлар ва категориялар, асосий тушунчалар ва тамойиллар ҳақидаги билимлар мухтасар тарзда баён қилинган.
-
Digital Watermarking and Steganography. Fundamentals and Techniques (Second Edition)
Digital watermarking and steganography are important topics because digital multimedia is widely used and the Internet is rapidly growing. This book intends to provide a comprehensive overview of the different aspects, mechanisms, and techniques of information security. It is written for students, researchers, and professionals who take the related courses, want to improve their knowledge, and want to gain experience in digital watermarking and steganography. Digital watermarking technology can be used to guarantee authenticity and as proof that the content has not been altered since insertion. Steganographic messages are often first encrypted by some traditional means, and then a covert text is modified in some way to contain the encrypted message. The need for information security exists everywhere, everyday.
-
Handbook of Applied Cryptography
This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material. It also provides a comprehensive source from which to learn cryptography, serving both students and instructors. In addition, the rigorous treatment, breadth, and extensive bibliographic material should make it an important reference for research professionals. Our goal was to assimilate the existing cryptographic knowledge of industrial interest into one consistent, self-contained volume accessible to engineers in practice, to computer scientists and mathematicians in academia, and to motivated non-specialists with a strong desire to learn cryptography.
-
Introduction to Modern Cryptography (Second Ed.)
The goal of our book remains the same as in the first edition: to present the basic paradigms and principles of modern cryptography to a general audience with a basic mathematics background. We have designed this book to serve as a textbook for undergraduate- or graduate-level courses in cryptography (in computer science, electrical engineering, or mathematics departments), as a general introduction suitable for self-study (especially for beginning graduate students), and as a reference for students, researchers, and practitioners.
-
Second Edition Skillful 4. Listening and Speaking. Digital Student's book pack
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.
-
Introduction to Computational Thinking. Problem Solving, Algorithms, Data Structures, and More
computation is done and how you can make computation efficient. Still, from time to time, I will show you tricks for making your programming efficient as well, meaning speeding up how fast you can write your programs, which is a separate issue from how efficient your programs are once you have implemented them. These tricks are generally applicable, provided your programming language supports the features we use, and for a working programmer, efficient programming is as important as efficient programs. I won't cover these tricks as separate topics, but show them when we study topics where they are useful.
-
O language hub B1+. Intermediate student's book
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.
-
Переходные электромеханические процессы в электрических системах
В книге рассматриваются переходные режимы электроэнергетических систем, имеющих автоматическое регулирование.
-
История России с древнейших времен до конца XVI века
В первой части учебника, автором которой является член-корреспондент РАН, директор Института российской истории РАН А.Н. Сахаров, дается широкая панорама истории нашего Отечества, детально освещается политическая история страны, рассматриваются вопросы ее хозяйственной жизни, культуры, быта. Основные вехи и события русской истории показаны через судьбы государственных деятелей,ученых, религиозных мыслителей, деятелей культуры, науки, изобретателей, первооткрывателей новых земель и других выдающихся личностей.
-
Bulding a Secure Computer System
This book is for the practicing computer professional who wants to understand—and perhaps implement—technical solutions to computer security problems. It covers the state of the art of applied computer security technology developed over the last fifteen or twenty years. It is a guide to building systems, not an exhaustive academic study, and provides enough information about selected techniques to give you a well-rounded understanding of the problems and solutions. It is not possible in one book to treat all applications of security while retaining the technical depth needed to cover each topic adequately. I have concentrated on applications for which prevailing literature is weak: operating systems, hardware architecture, networks, and practical verification. Subjects about which books are already available, such as database security and cryptographic algorithms, receive less discussion here.
-
Second Edition Skillful 4. Reading and Writing digital student's book pack
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.
-
Cryptographic Protocol. Security Analysis Based on Trusted Freshness
A network protocol is a formal description of digital message formats, and of the rules for exchanging those messages in or between computing systems. A cryptographic protocol (also called a security protocol) is a kind of special network protocol that performs a security-related function and applies cryptographic methods. Network protocols are typically developed in layers, with each layer responsible for a different aspect of communication; the security mechanisms are therefore embedded in layers. For instance, Transport Layer Security (TLS) is a well-known cryptographic protocol proposed for adding security services to TCP. In fact, cryptographic protocols are widely used for key establishment, entity authentication, message authentication, and secure data transport, or non-repudiation methods. Due to the asynchronous nature of communication, although there are only a few messages in a cryptographic protocol, the protocol may not be as secure as intended. For example, the Needham-Schroeder public-key authentication protocol was found to be flawed in 1995, seventeen years after its publication.
-
Основы изучения и прогнозирования спроса на бытовые услуги
В учебнике рассматривается содержание основопологающих для данной сферы потребления экономических категорий. Отражены специфические особенности спроса и потребления бытовых услуг.
-
Open Mind intermediate student's book pack
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.
-
Destination B2 Grammar and Vocabulary
Ushbu darslik chet tillari fakulteti talabalari va til o'rganuvchi keng kitobxonlar ommasiga mo'ljallangan.
-
Анализ текста. Основное содержание. Сочинения
Каждая книга условно делится на три блока. В первом помещен краткий пересказ крупного произведения, которое входит в школьную программу по литературному образованию. В книгах, посвященных творчеству поэтов, содержится подборка стихотворений, которые наиболее полно отражают их художественный мир, характерны для их творчества.