Book picks similar to
The Design of Rijndael: AES - The Advanced Encryption Standard by Joan Daemen
tsundoku-nonfiction
crypto
it-wikipedia
texts
Engineering Electromagnetics
William H. Hayt Jr. - 1950
This edition retains the scope and emphasis that have made the book very successful while adding over twenty new numerical examples and over 550 new end-of-chapter problems.
The Dowager's Daughter
Mona Prevel - 2002
As she sneaks away for illicit meetings with a mysterious stranger, Althea is determined to unveil his identity—and his intentions.Desperate to escape from beneath the shadow of his older brother, John Ridley takes part in a daring game of espionage against the French. Posing as a smuggler, he engages with the charming Celeste Markham. But despite her winsome allure, it is her daughter, Althea, who seizes John's attention.As affairs of the state give way to affairs of heart, John must convince Althea that she can trust him with her future, and her love.
Breaking Bard: Serenade
A.J. Wiseman - 2018
Darren is homeless when he’s offered the deal of a lifetime: get paid to play a bard in an online, virtual reality game. The catch? He’s tasked with awakening Angelica, a crippled girl who’s spent ten years in the game. As he embarks on his search for her, Darren goes on adventures, learns the lore of the land, and finds that being a bard is more fun than it seemed. But appearances can deceive—especially in a VR world—and Darren is taken aback to discover the girl he’s been assigned to track may not even be the right one. When he finds not one but three girls who fit the bill for Angelica, Darren is forced to stretch his talents and skills to investigate them all, thrusting himself into the midst of warring players, corrupted guilds and forgotten lore. As secrets bubble to the surface and chaos looms, Darren’s investigation puts the girls under threat, and he’s forced to decide where his loyalties lie. Can he uncover the truth and save them before it’s too late? And more importantly… does he have what it takes to be a Bard? Read Breaking Bard: Serenade now and immerse yourself in a LitRPG adventure with sexy goodness and a wily hero who doesn’t quite know what he’s gotten himself into. Warning: Contains graphic violence, revenge, swear words, conspiracies, harassment, forbidden gods, gratuitous sex, and elements of polyamory/harem. If any of these is not your thing, this book is not for you.
Godel: A Life Of Logic, The Mind, And Mathematics
John L. Casti - 2000
His Incompleteness Theorem turned not only mathematics but also the whole world of science and philosophy on its head. Equally legendary were Gö's eccentricities, his close friendship with Albert Einstein, and his paranoid fear of germs that eventually led to his death from self-starvation. Now, in the first popular biography of this strange and brilliant thinker, John Casti and Werner DePauli bring the legend to life. After describing his childhood in the Moravian capital of Brno, the authors trace the arc of Gö's remarkable career, from the famed Vienna Circle, where philosophers and scientists debated notions of truth, to the Institute for Advanced Study in Princeton, New Jersey, where he lived and worked until his death in 1978. In the process, they shed light on Gö's contributions to mathematics, philosophy, computer science, artificial intelligence -- even cosmology -- in an entertaining and accessible way.
Computer Science Illuminated
Nell B. Dale - 2002
Written By Two Of Today'S Most Respected Computer Science Educators, Nell Dale And John Lewis, The Text Provides A Broad Overview Of The Many Aspects Of The Discipline From A Generic View Point. Separate Program Language Chapters Are Available As Bundle Items For Those Instructors Who Would Like To Explore A Particular Programming Language With Their Students. The Many Layers Of Computing Are Thoroughly Explained Beginning With The Information Layer, Working Through The Hardware, Programming, Operating Systems, Application, And Communication Layers, And Ending With A Discussion On The Limitations Of Computing. Perfect For Introductory Computing And Computer Science Courses, Computer Science Illuminated, Third Edition's Thorough Presentation Of Computing Systems Provides Computer Science Majors With A Solid Foundation For Further Study, And Offers Non-Majors A Comprehensive And Complete Introduction To Computing.
Night of the Hunter
Rick Jones - 2016
When he returns stateside to begin life anew, he quickly finds himself caught up in a scandal involving the appropriation of documents for an undetectable state-of-the-art ICBM by the Islamic State. But what if Jon Jericho discovers something different? What if he learns that the plans were appropriated by American and Israeli intelligence, and then proffered to the Islamic State? As Jericho digs deeper he quickly draws the attention of certain CIA principals. So when a CIA paramilitary group gives chase to terminate Jericho with extreme prejudice to keep the conspiracy safe, the Hunter must utilize his special skill set not only to survive, but to bring forward the hidden truth before the world erupts into global war.
The Bowflex Body Plan: The Power is Yours - Build More Muscle, Lose More Fat
Ellington Darden - 2003
Well, you don't have to resemble a model to achieve a Bowflex body. Now, you can apply the complete science behind what it takes to get that lean, muscular look. The course of action you're holding in your hands contains the best-possible routines and practices that, combined, cause greater and faster results.The Bowflex exercise system is based on the simple bow-and-arrow principle. Its patented Power Rod technology flexes and extends to provide force or resistance, part of your week-by-week workouts, which focus on all major muscle groups. Merge the recommended Bowflex routines with Dr. Ellington Darden's guidelines on eating, hydrating, and resting, and you'll be well on your way to getting the results you've always wanted.In addition to four fat-loss meal plans, you'll find complete programs for out-of-shape athletes, women who want to reduce their hips and thighs, and individuals who wish to focus on their abdominals. Choose the one that's right for you, depending on your age, experience, body type, and personal goals. Throughout these pages you'll be inspired by reports and photographs of real results from real people using a real Bowflex machine.With a little discipline and patience, you'll see your extra fat begin to vanish, revealing your muscles' lean lines. In only six weeks, a man could drop 35 pounds of fat and 5 inches from his waist. A woman could lose 19 pounds of fat and 4 inches from her thighs. And both can build 3 pounds of muscle. Best of all, you will experience strength, firmness, and muscular refinement as never before.Elegant, instructive photographs of Dr. Darden's top 23 Bowflex exercises make this the ideal fitness manual for both men and women-- those who already use the Bowflex system as well as the many new users of this fast-growing home-exercise system. The only authorized book on the subject, The Bowflex Body Plan will help you lose fat, build muscle, and reshape your body-- fast.Soon you will have the results you've always wanted. Soon you will have a Bowflex body.
Bittersweet: A short story collection plus extract of new novel Christmas at the Beach Hut
Veronica Henry - 2018
From forgotten loves to second chances, new happiness and old friends, this is an uplifting and moving collection of short stories about how love changes, and how it changes us - from Sunday Times bestseller Veronica Henry.
Your favourite authors love Veronica's gorgeous storytelling:
'Fills your heart with joy and leaves you with a big fat smile on your face' Milly Johnson on Christmas at the Beach Hut
'Truly blissful escapism' Lucy Diamond on A Family Recipe
'A delight from start to finish' Jill Mansell on The Forever House
- - - - -
** This is a collection of short stories **
Blockchain: The Beginners Guide to Understanding the Technology Behind Bitcoin & Cryptocurrency (The Future of Money)
Artemis Caro - 2017
As a result, many people are left with an incomplete understanding of this transformative new technology and its massive implications for the future. The goal of this book is not to plumb the depths of the mathematical wizardry used to code blockchain-based applications, but rather to serve as an introduction to the broader architecture and conceptual background behind blockchain technology. We will take a practical approach, examining how Blockchains are used in the real world. In this short, concise guide you will learn:
A Brief History of Blockchain Technology
Blockchain Basics: Managing Digital Transactions
What is a Distributed Ledger?
Blockchain Beyond Bitcoin
Implications Of Blockchain: Big Data, Privacy & Personal Data
Profiting from Blockchain Technologies
Limitations & Challenges of Blockchain
The Future of Blockchain
For Centuries, people have relied on corrupt Centralized Institutions like banks and Governments to serve as intermediaries when it comes to storing and transacting financial assets.
This is ALL About To Change...
Make sure you take action and join the Financial Revolution by reading this book!
Scar Tissue
David Skivington - 2013
Transported to a dingy basement in Kolkata to identify the body of her murdered husband she has no explanation for his presence in India. As she searches for answers about who the man she married really was she finds his death surrounded by allegations of drug smuggling, child trafficking and murder. Unsure of what is true and who she can trust, Rachel has no idea of the danger her husband's hidden life has put her in.
Google Hacking: An Ethical Hacking Guide To Google
Ankit Fadia - 2007
Google Hacking teaches people how to get the most out of this revolutionary search engine. Not only will this book teach readers how Google works, but it will also empower them with the necessary skills to make their everyday searches easier, more efficient, and more productive. Google Hacking also demonstrates how Google can be used for negative means. It's immense searching power, means that everyone, including cyber criminals, can feasibly access confidential data, such as company presentations, budgets, blueprints, even credit card numbers, with just the click of a mouse. Using numerous examples, case studies, and screenshots, this book explains the art of ethical Google Hacking -- it not only teaches readers how Google works, but it provides them with the knowledge they need to protect their data and systems from getting Google Hacked. This is the only book you need to maximize (and protect yourself) from Google searches!
617 Squadron: The Dambusters at War (Memoirs from World War Two)
Tom Bennett - 1986
Kafka: A Biography
Nicholas Murray - 2004
This engrossing biography of the Czech novelist and short-story writer emphasizes the cultural and historical contexts of his fiction and focuses for the first time on his complex relationship with his father.Nicholas Murray paints a picture of Kafka’s German-speaking Jewish family and the Prague mercantile bourgeoisie to which they belonged. He describes Kafka’s demanding professional career, his ill health, and the constantly receding prospects of a marriage he craved. He analyzes Kafka’s poor relationship with his father, Hermann, which found its most eloquent expression in Kafka’s story “The Judgement,” about a father who condemns his son to death by drowning. And he asserts that the unsettling flavor of Kafka’s books—stories suffused with guilt and frustration—derives from his sense of living in a mysteriously antagonistic world, of being a criminal without having knowingly committed a crime.Compelling and empathetic, this book sheds new light on a man of unique genius and on his enigmatic works.
The Scheme Programming Language
R. Kent Dybvig - 1987
Many exercises are presented to help reinforce the lessons learned, and answers to the exercises are given in a new appendix.Most of the remaining chapters are dedicated to the reference material, which describes in detail the standard features of Scheme included in the Revised$^5$ Report on Scheme and the ANSI/IEEE standard for Scheme.Numerous examples are presented throughout the introductory and reference portions of the text, and a unique set of extended example programs and applications, with additional exercises, are presented in the final chapter. Reinforcing the book's utility as a reference text are appendices that present the formal syntax of Scheme, a summary of standard forms and procedures, and a bibliography of Scheme resources.The Scheme Programming Language stands alone as an introduction to and essential reference for Scheme programmers. it is also useful as a supplementary text for any course that uses Scheme.The Scheme Programming Language is illustrated by artist Jean-Pierre Hébert, who writes Scheme programs to extend his ability to create sophisticated works of digital art.R. Kent Dybvig is Professor of Computer Science at Indiana University and principal developer of Chez Scheme.
The Bride Prize
Emma Prince - 2016
In order to earn a spot on his Jarl’s voyage, he must compete against his fellow Northmen in games of strength and skill. But when he learns that the prize for winning the competition is the hand of the dark-haired beauty he met only days ago, will he be forced to choose between his dreams and his heart? Eyva wants nothing more than to train as a shieldmaiden, but her parents refuse, hoping to yoke her to their Northland farm forever. When they put her up as the bride prize for their village’s festivities, she fears she will never escape the fate of a grueling life on her parents’ farm. But Tarr’s longing gaze and soft kisses just might give her the courage to fight for herself—and for their budding love. *This is a novella in the Viking Lore series and features all the beloved characters from Enthralled, Shieldmaiden’s Revenge, and Desire’s Hostage. Although it is meant to take place between Shieldmaiden’s Revenge (Book 2) and Desire’s Hostage (Book 3), it can be read as a stand-alone novella. **This novella was originally published in the Sirens of the Northern Seas collection in January, 2016.