Hashish!

Hashish!
Author: Robert Connell Clarke
Publisher:
Total Pages: 0
Release: 2012-08-07
Genre: Hashish
ISBN: 9780929349077

This lavishly illustrated compendium of all things hashish appeals to illicit substance consumers, medical users, and history buffs alike. Author Robert Connell Clarke traces hashish origins, history, consumption, production and chemistry, from earliest times to the present. Traditional methods of collecting cannabis resin and processing it into hashish are described in detail. The second edition of Hashish boasts more than 270 photographs, drawings, maps, graphs, and tables, including 63 updated color photographs. It also includes bibliographical references and a useful index.

The Theory of Hash Functions and Random Oracles

The Theory of Hash Functions and Random Oracles
Author: Arno Mittelbach
Publisher: Springer Nature
Total Pages: 788
Release: 2021-01-19
Genre: Computers
ISBN: 3030632873

Hash functions are the cryptographer’s Swiss Army knife. Even though they play an integral part in today’s cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption schemes. In this book the authors take a different approach and place hash functions at the center. The result is not only an introduction to the theory of hash functions and the random oracle model but a comprehensive introduction to modern cryptography. After motivating their unique approach, in the first chapter the authors introduce the concepts from computability theory, probability theory, information theory, complexity theory, and information-theoretic security that are required to understand the book content. In Part I they introduce the foundations of hash functions and modern cryptography. They cover a number of schemes, concepts, and proof techniques, including computational security, one-way functions, pseudorandomness and pseudorandom functions, game-based proofs, message authentication codes, encryption schemes, signature schemes, and collision-resistant (hash) functions. In Part II the authors explain the random oracle model, proof techniques used with random oracles, random oracle constructions, and examples of real-world random oracle schemes. They also address the limitations of random oracles and the random oracle controversy, the fact that uninstantiable schemes exist which are provably secure in the random oracle model but which become insecure with any real-world hash function. Finally in Part III the authors focus on constructions of hash functions. This includes a treatment of iterative hash functions and generic attacks against hash functions, constructions of hash functions based on block ciphers and number-theoretic assumptions, a discussion of privately keyed hash functions including a full security proof for HMAC, and a presentation of real-world hash functions. The text is supported with exercises, notes, references, and pointers to further reading, and it is a suitable textbook for undergraduate and graduate students, and researchers of cryptology and information security.

Introduction To Algorithms

Introduction To Algorithms
Author: Thomas H Cormen
Publisher: MIT Press
Total Pages: 1216
Release: 2001
Genre: Computers
ISBN: 9780262032933

An extensively revised edition of a mathematically rigorous yet accessible introduction to algorithms.

How I Became The Hash Queen

How I Became The Hash Queen
Author: Mila
Publisher: Mama Editions
Total Pages: 584
Release: 2018-07-10
Genre: Biography & Autobiography
ISBN: 2845942516

How I Became the Hash Queen is an exciting personal account from one of the cannabis industry's rare female icons, a life story unlike any other that takes us from 1960s Amsterdam to the Himalayas, and to the burgeoning legal weed scene in the U.S. Présentation Mila's autobiography is intriguing and inspiring on many levels. As a mother, inventor, traveler, lover, and spiritual practitioner, she has taken incredible risks and embarked on unimaginable adventures. Reinventing herself and creating businesses over and over, Mila supported her children and was a rebel at the same time. Her story is, by turns, a riveting travel-log of trekking through uncharted passes and to secret monasteries, and part ultra-personal account of love stories and heartbreaks. Mila takes us with her to the first parties on the beach in Goa, India, and into the heart of the sixties revolution in fashion and music in Amsterdam. Through it all, she faces the challenge of being a single mother, even as she becomes a pioneer in a traditionally male industry with her game-changing inventions, which have shaped the future of hash-making. This book offers an inside view into a wide variety of alternative worlds and experiences, in the company of a fascinating woman. L’autrice Mila, also known as “The Hash Queen,” was recently honored with being named one of the 100 most influential people in the world of cannabis—and her fame continues to expand.

Effective Java

Effective Java
Author: Joshua Bloch
Publisher: Addison-Wesley Professional
Total Pages: 375
Release: 2008-05-08
Genre: Computers
ISBN: 0132778041

Are you looking for a deeper understanding of the JavaTM programming language so that you can write code that is clearer, more correct, more robust, and more reusable? Look no further! Effective JavaTM, Second Edition, brings together seventy-eight indispensable programmer’s rules of thumb: working, best-practice solutions for the programming challenges you encounter every day. This highly anticipated new edition of the classic, Jolt Award-winning work has been thoroughly updated to cover Java SE 5 and Java SE 6 features introduced since the first edition. Bloch explores new design patterns and language idioms, showing you how to make the most of features ranging from generics to enums, annotations to autoboxing. Each chapter in the book consists of several “items” presented in the form of a short, standalone essay that provides specific advice, insight into Java platform subtleties, and outstanding code examples. The comprehensive descriptions and explanations for each item illuminate what to do, what not to do, and why. Highlights include: New coverage of generics, enums, annotations, autoboxing, the for-each loop, varargs, concurrency utilities, and much more Updated techniques and best practices on classic topics, including objects, classes, libraries, methods, and serialization How to avoid the traps and pitfalls of commonly misunderstood subtleties of the language Focus on the language and its most fundamental libraries: java.lang, java.util, and, to a lesser extent, java.util.concurrent and java.io Simply put, Effective JavaTM, Second Edition, presents the most practical, authoritative guidelines available for writing efficient, well-designed programs.

Progress in Cryptology - INDOCRYPT 2006

Progress in Cryptology - INDOCRYPT 2006
Author: Rana Barua
Publisher: Springer Science & Business Media
Total Pages: 466
Release: 2006-11-27
Genre: Business & Economics
ISBN: 3540497676

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006. The 29 revised full papers and 2 invited papers cover such topics as symmetric cryptography, provable security, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.

Marijuana Horticulture

Marijuana Horticulture
Author: Jorge Cervantes
Publisher: Van Patten Publishing
Total Pages: 518
Release: 2006
Genre: Gardening
ISBN: 9781878823236

Expanded and completely rewritten with information on grow rooms, greenhouses and outdoor growing, medicinal cannabis, security, lighting, fertilisers, hydroponics, Sea of Green, seeds, seedlings, vegetative growth, mother plants, cloning, flowering, harvesting and curing, diseases, pests and hash making. More than 1100 full colour photos and drawings illustrate every detail and numerous simple cultivation solutions make for easy appeal to novice growers. Readers will learn how to achieve the highest, most potent yields, even with limited space and budget.