Encyclopedia of Cryptography and Security

Encyclopedia of Cryptography and Security
English | Size: 32.96 MB
Category: E-book

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security. [Read more…]

Plants of the World An Illustrated Encyclopedia of Vascular Plants

Plants of the World: An Illustrated Encyclopedia of Vascular Plants
English | Size: 199.52 MB
Category: Ebook

Plants of the World is the first book to systematically explore every vascular plant family on earth-more than four hundred and fifty of them-organized in a modern phylogenetic order. Detailed entries for each family include descriptions, distribution, evolutionary relationships, and fascinating information on economic uses of plants and etymology of their names. All entries are also copiously illustrated in full color with more than 2,500 stunning photographs. A collaboration among three celebrated botanists at the Royal Botanic Gardens, Kew, Plants of the World is authoritative, comprehensive, and beautiful. Covering everything from ferns to angiosperms, it will be an essential resource for practicing botanists, horticulturists, and nascent green thumbs alike. [Read more…]

John F. A. Sawyer & J.M.Y. Simpson – Concise Encyclopedia of Language and Religion

John F. A. Sawyer & J.M.Y. Simpson – Concise Encyclopedia of Language and Religion
English | Size: 278.62 MB
Category: Academic / Reference

The Concise Encyclopedia of Language and Religion provides the specialist and the general reader with accurate, up-to-date information on every aspect of the crucial interface between language and religion. Easy access to material in over 320 articles by scholars in many fields is provided both in a clear thematic arrangement, and by means of a comprehensive and detailed general index. Discussion of many topics including the creation of special sacred scripts, religious calligraphy, and the use of religious symbols in meditation, magic and elsewhere, is enriched and elucidated by illustrations, diagrams and tables. [Read more…]

Complete Wi-Fi Hacking Encyclopedia

Complete Wi-Fi Hacking Encyclopedia
English | Size: 603.83 MB
Category: Tutorial

This tutorial on Wi-Fi hacking elaborates the various techniques by which you can hack the WEP, WPA/WPA2 and WPS Wi-Fi routers. This course will walk you through the processes and steps right from scratch. At the end of the course, you will become a pro-Wi-Fi penetrator. The course teaches caffe-latte attack, ChopChop attack, WPS pixie attack, fragment attack, arp replay attack, de-authentication attack, Fluxion, Wi-Fi Phisher, Linset and a lot more. [Read more…]

Wiley Encyclopedia of Electrical and Electronics Engineering 24 Volume Seta

Wiley Encyclopedia of Electrical and Electronics Engineering 24 Volume Seta
English | Size: 388.53 MB
Category: Tutorial

This 24 volume set offers comprehensive coverage of the electrical and electronics engineering field. Covers wide range of information from power systems and communications to advanced applications in neural networks and robotics.
[Read more…]

Udemy Complete WIFI Hacking Encyclopedia Tutorial-kEISO-bs

Udemy Complete WIFI Hacking Encyclopedia Tutorial-kEISO-bs
English | Size: 498.72 MB
Category: CBTs

Get ready to gain the complete wireless pen-testing knowledge in easy way. Also learn the secrets method of breaching the wireless networks.After enrolling into this course you don’t need to know anything else this course will give you the entire Network breaching ideas. After taking this course you can become self dependent you can research by yourself.A course especially designed by a group of cyber security experts(Pen-testers). [Read more…]