• TrueRNGpro - USB Hardware Random Number Generator

    The TrueRNG pro provides a steady stream of random numbers through a USB CDC serial port. The random data can then be used to fill the entropy pool in an operating system, or used directly in a custom application. The TrueRNG is ideal for Security related applications (SSH, SSL, GPG), Gaming (dice,cards), Statistical Sampling and simulations. The TrueRNGpro is 9x faster than the TrueRNG V2. It also comes with various modes allowing more flexibility. *USB cable not Included

    • ASIN: B01JTJ6D0S
    • UPC: 784672643467
    • ASIN: B01JTJ6D0S
    • Brand: ubld.it
    • Manufacturer: Ubld Electronics, LLC.

  • Random Numbers and Computers

    This book covers pseudorandom number generation algorithms, evaluation techniques, and offers practical advice and code examples. Random Numbers and Computers is an essential introduction or refresher on pseudorandom numbers in computer science.  The first comprehensive book on the topic, readers are provided with a practical introduction to the techniques of pseudorandom number generation, including how the algorithms work and how to test the output to decide if it is suitable for a particular purpose.    Practical applications are demonstrated with hands-on presentation and descriptions t... [Read More]

    • ASIN: 3319776967
    • ASIN: 3319776967
    • ISBN: 9783319776965
    • Manufacturer: Springer

  • VB-2012 Random Numbers - introducing one of the best psuedorandom number generators (VB-2012 Programming by Example Book 3)

    This book's theme is random numbers. To be more precise, the subject is pseudorandom numbers, because they are repeatable and therefore not truly and completely random.However, the new algorithm presented here does create a unique and never repeated sequence for each and every possible string used as a seed, and each of those sequences effectively has an infinite cycle length.This "Programming by Example" series of books on Visual Basic programming is a little different than most every book out there. Rather than being language-centric, these books are more topic-centric. That is, instead of j... [Read More]

    • ASIN: B0075RJ42G
    • ASIN: B0075RJ42G
    • Manufacturer: Books To Believe In

  • Slots


    • ASIN: B00XNSZWM2
    • ASIN: B00XNSZWM2
    • Brand: Megarama - Fun Las Vegas Style Free Casino Games
    • Manufacturer: Megarama - Fun Las Vegas Style Free Casino Games

  • Explorations in Monte Carlo Methods (Undergraduate Texts in Mathematics)

    Monte Carlo methods are among the most used and useful computational tools available today, providing efficient and practical algorithims to solve a wide range of scientific and engineering problems. Applications covered in this book include optimization, finance, statistical mechanics, birth and death processes, and gambling systems. Explorations in Monte Carlo Methods provides a hands-on approach to learning this subject. Each new idea is carefully motivated by a realistic problem, thus leading from questions to theory via examples and numerical simulations. Programming exercises are integra... [Read More]

    • ASIN: 038787836X
    • ASIN: 038787836X
    • ISBN: 038787836X
    • Manufacturer: Springer

  • Applied Number Theory

    This textbook effectively builds a bridge from basic number theory to recent advances in applied number theory. It presents the first unified account of the four major areas of application where number theory plays a fundamental role, namely cryptography, coding theory, quasi-Monte Carlo methods, and pseudorandom number generation, allowing the authors to delineate the manifold links and interrelations between these areas.Number theory, which Carl-Friedrich Gauss famously dubbed the queen of mathematics, has always been considered a very beautiful field of mathematics, producing lovely results... [Read More]

    • ASIN: 3319223208
    • ASIN: 3319223208
    • ISBN: 3319223208
    • Manufacturer: Springer

  • Cryptographic Engineering

    Intended for a graduate-level course in Cryptographic Engineering, this text will teach students with a basic knowledge of computer cryptograms how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems.

    • ASIN: 1441944176
    • ASIN: 1441944176
    • ISBN: 1441944176
    • Manufacturer: Springer

  • Circuits and Systems for Security and Privacy (Devices, Circuits, and Systems)

    Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as eff... [Read More]

    • ASIN: 1482236885
    • ASIN: 1482236885
    • ISBN: 1482236885
    • Manufacturer: CRC Press

  • Discrete and Continuous Simulation: Theory and Practice

    When it comes to discovering glitches inherent in complex systems―be it a railway or banking, chemical production, medical, manufacturing, or inventory control system―developing a simulation of a system can identify problems with less time, effort, and disruption than it would take to employ the original. Advantageous to both academic and industrial practitioners, Discrete and Continuous Simulation: Theory and Practice offers a detailed view of simulation that is useful in several fields of study. This text concentrates on the simulation of complex systems, covering the basics in detail a... [Read More]

    • ASIN: 1466596392
    • ASIN: 1466596392
    • ISBN: 1466596392
    • Manufacturer: CRC Press

  • Open Problems in Mathematics and Computational Science

    This book presents interesting, important unsolved problems in the mathematical and computational sciences. The contributing authors are leading researchers in their fields and they explain outstanding challenges in their domains, first by offering basic definitions, explaining the context, and summarizing related algorithms, theorems, and proofs, and then by suggesting creative solutions. The authors feel a strong motivation to excite deep research and discussion in the mathematical and computational sciences community, and the book will be of value to postgraduate students and researchers i... [Read More]

    • ASIN: 3319106821
    • ASIN: 3319106821
    • ISBN: 3319106821
    • Manufacturer: Springer

  • AOM-TPM-9665V-S SECURITY DEVICE

    Specifications Mfr Part Number: AOM-TPM-9665V-S Features: TCG 2.0 compliant trusted platform module (TPM) Microcontroller in 0.22/0.09 ìm CMOS technology Compliant embedded software EEPROM for TCG firmware enhancements and for user data and keys Hardware accelerator for SHA-1 and SHA-256 hash algorithm True Random Number Generator (TRNG) Tick counter with tamper detection Protection against Dictionary Attack General Purpose Input/output Intel Trusted Execution Technology (TXT) Support Full personalization with Endorsement Key (EK) and EK certificate Power saving sleep mode 3.3 V power supp... [Read More]

    • ASIN: B01ENG4UX4
    • UPC: 672042217823
    • ASIN: B01ENG4UX4
    • Brand: Supermicro
    • Manufacturer: Supermicro

  • Encrypted Data Security USB Device, Dataram QBKEY Fingerprint Password Manager USB-C Encryption Key and SSH Agent for Windows

    ⦁Safely secure any type of data, anywhere, anytime without storage limitations. ⦁A device-to-device file sharing solution. Support IPFS - INTERPLANETARY FILE SYSTEM. ⦁Password Management without account registration. ⦁Full Drive Encryption for local drives or external drives.Add/remove other QBKEY users to/from their encrypted drives. ⦁SSH Key management. Scan your finger to load your SSH keys. As easy as that. ⦁Plausible Deniability & Coerced Finger Scanning Protection. ⦁Biometric Authentication ⦁Mitigates Phishing and MitM Attacks ⦁Autonomous and independent ⦁Produced... [Read More]

    • ASIN: B07FFVTWGC
    • UPC: 767523445175
    • ASIN: B07FFVTWGC
    • Brand: Dataram
    • Manufacturer: Dataram

  • PAC Supplies USA Feitian PKI Epass 2003 Fips Validated, ICP Brazil,Citrix Ready, Authenication Token USB Dongle

    ePass2003 is the world's foremost cryptographic identity verification module. ePass by FEITIAN provides a host of indispensable protective measures for digital communication and transaction. As a two factor authentication solution ePass2003 can secure local and remote desktop and network log-on. Key cryptography and the digital signing of emails, documents, and transactions are performed onboard in the secure token framework which is impervious to after-market modification and manipulation. Built-in high-performance secure smart card chip Smart card chip certified by Common Criteria EAL 5+ On ... [Read More]

    • ASIN: B018T6IL16
    • UPC: 637230571576
    • ASIN: B018T6IL16
    • Brand: PAC Supplies USA
    • Manufacturer: Feitian

  • Things to Make and Do in the Fourth Dimension : A Mathematician's Journey Through Narcissistic Numbers, Optimal Dating Algorithms, at Least Two Kinds of Infinity, and More

    Originally published: Great Britain: Particular Books,

    • UPC: 45762534

  • Machine Learning For Beginners Guide Algorithms: Supervised & Unsupervsied Learning. Decision Tree & Random Forest Introduction - eBook

     200+ pages of valuable content! Machines can LEARN?!?!  Machine learning occurs primarily through the use of " algorithms" and other elaborate procedures.Whether you're a novice, intermediate or expert this book will teach you  all  the ins, outs

    • UPC: 222568893

  • Image Comics Wizard Magazine X-Men 30th Anniversary Single Trading Card [Limited Edition, RANDOM Number ]

    Rob Liefeld

    • UPC: 717133232

  • Fuzzy Based Pseudo Random Number Generator Used for Wireless Networks

    Fuzzy Based Pseudo Random Number Generator Used for Wireless

    • UPC: 484536641

  • Random Number Generators—Principles and Practices - eBook

    Random Number Generators, Principles and Practices has been written for programmers, hardware engineers, and sophisticated hobbyists interested in understanding random numbers generators and gaining the tools necessary to work with random number generators with confidence

    • UPC: 917039759

  • Random Number - eBook

    RANDOM NUMBER…This was the chance they had gambled on…The bomb was hidden deep in the hotel’s basement two years earlier on spec. Now the Washington hotel is to host a US government sponsored Middle East

    • UPC: 408683513

  • Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generators - eBook

    Modern computing systems preserve all information in intricate binary codes. The evolution of systems and technologies that aid in this preservation process must be continually assessed to ensure that they are keeping up with the

    • UPC: 295696536

  • Random Number Generators--Principles and Practices : A Guide for Engineers and Programmers

    Random Number Generators, Principles and Practices has been written for programmers, hardware engineers, and sophisticated hobbyists interested in understanding random numbers generators and gaining the tools necessary to work with random number generators with confidence

    • UPC: 896066812

  • Mathematical Conversations : Multicolor Problems, Problems in the Theory of Numbers, and Random Walks

    9780486453514

    • UPC: 25025170

  • JOYFEEL Clearance 2019 Murmurous Sounds Mouse Shaped Feather Tail Tumbler Toys for Cats Color Random Best Toy Gifts for Children Kids

    WELCOME TO OUR  JOYFEEL ONLINE STORE,  WE HAVE ALL KINDS OF PRODUCTS WHITCH ARE HIGH QUALITY AND BIG DISCOUNT FOR YOU.  LOOK FORWARD TO YOUR TOURIST ON OUR ONLINE STORE . SAVE MORE ! LIVE

    • UPC: 532507463

  • How to Generate Pseudorandom Numbers | Infinite Series

    Coding Math: Episode 51 - Pseudo Random Number Generators Part I

    Random Numbers - Numberphile