|
|
Результат поиска |
Поиск книг, содержащих: Hash function
Книга | Страницы для поиска | Кормен Т., Лейзерсон Ч., Ривест Р. — Алгоритмы: построение и анализ | 215 | Олифер В.Г., Олифер Н.А. — Сетевые операционные системы | 483 | Гудрич М.Т., Тамассия Р. — Структуры данных и алгоритмы в Java | 369 | Lee J.S., Miller L.E. — CDMA systems engineering handbook | 353, 407—17 | Mughal K., Rasmussen R. — A Programmer's Guide to Java Certification: A Comprehesive Primer | | Aho A.V., Sethi R., Ullman J.D. — Compilers: principles, techniques and tools | 434—438 | Deitel H.M. — Visual C# How to Program | | Shoup V.A. — Computational Introduction to Number Theory and Algebra | 125 | Koblitz N. — A course in number theory and cryptography | 89 | Hein J.L. — Discrete Mathematics | 96 | Bach M.J. — The design of the UNIX operating system | 41, 42, 58 | Mahmoud H.M. — Sorting: a distribution theory | 251, 281, 283 | Kushilevitz E., Nisan N. — Communication Complexity | 65 | von zur Gathen J., Gerhard J. — Modern computer algebra | 552 | Brookshear J.G. — Computer Science: An Overview | 435 | Hein J.L. — Discrete Structures, Logic, and Computability | 94 | Koblitz N., Wu Y.-H., Menezes A.J. — Algebraic Aspects of Cryptography | 4, 6, 13, 100 | Ullman J.D. — Principles of database systems | 40, 43, 46(see also “Partitioned hash function”) | Scott M.L. — Programming Language Pragmatics | 135, 139, 517 | Koblitz N., Menezes A.J. (Contributor), Wu Y.-H. (Contributor) — Algebraic Aspects of Cryptography | 4, 6, 13, 100 | Seibel P. — Practical common Lisp | 138 | Kernighan B.W., Ritchie D.M. — The C programming language | 144 | Smyth B. — Computing patterns in strings | 199—200 | Kernighan B.W., Pike R. — The practice of programming | 55, 57 | Leeuwen J.V. — Handbook of Theoretical Computer Science: Algorithms and Complexity | 30, 315, 493, 962 | Stinson D.R. — Cryptography: Theory and practice | 120 | Brookshear J. — Computer Science | 435 | Leeuwen J. (ed.), Meyer A.R., Nivat M. — Algorithms and Complexity, Volume A | 30,315,493,962 | Neuenschwander D. — Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics | 139 | Witten I.H., Moffat A., Bell T.C. — Managing Gigabytes: Compressing and Indexing Documents and Images | 151, 161, 254, 255 | Seress Á. — Permutation Group Algorithms | 22, 142 | Shen A. — Algorithms and Programming | 151 | Jacky J. — The Way of Z: Practical Programming with Formal Methods | 251—252, 324—325 | John Aycock — Computer Viruses and Malware | 40, 62, 104 |
|
|