Search alternatives:
22big data » big data, 6_big data, 1_big data

1
by Nita, Stefania Loredana, Mihailescu, Marius
Published 2019
Apress
Table of Contents: .... Parallelism -- 19. Haskell Pipes -- 20. Lens -- 21. Lazy Evaluation -- 22. Performance -- 23. Haskell Stack...

2 Table of Contents: ... Cryptography -- 13. Chaos-based Cryptography -- 14. Big Data Cryptography -- 15. Cloud Computing Cryptography...

3 Table of Contents: ... Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17...

4 Table of Contents: ... Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17...

5 Table of Contents: ... Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17...

6 Table of Contents: ...: Big Data Cryptography -- Chapter 17: Cloud Computing Cryptography -- Part III: Pro Cryptanalysis...

7 Table of Contents: ...: Big Data Cryptography -- Chapter 17: Cloud Computing Cryptography -- Part III: Pro Cryptanalysis...