Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Cryptography Demystified
Cryptography Demystified

Works through 35 cryptography modules supported by exercises and answers

This first part comprises thirteen modules. These modules will  familiarize you with some of the important terms and concepts of  cryptography in general and symmetric of one-key cryptography in specific. Symmetric cryptography is the
...
Fork Algebras in Algebra, Logic and Computer Science
Fork Algebras in Algebra, Logic and Computer Science

Fork algebras are a formalism based on the relational calculus, with interesting algebraic and metalogical properties. Their representability is especially appealing in computer science, since it allows a closer relationship between their language and models. This book gives a careful account of the results and presents some applications of...

Genetic Fuzzy Systems
Genetic Fuzzy Systems

In recent years, a great number of publications have explored the use of genetic algorithms as a tool for designing fuzzy systems. Genetic Fuzzy Systems explores and discusses this symbiosis of evolutionary computation and fuzzy logic. The book summarizes and analyzes the novel field of genetic fuzzy systems, paying special attention to...

Unicode Demystified: A Practical Programmer's Guide to the Encoding Standard
Unicode Demystified: A Practical Programmer's Guide to the Encoding Standard

Offers an in-depth introduction to the encoding standard and provides the tools and techniques necessary to create today's globally interoperable software systems. Presents strategies for implementing various aspects of the standard. Softcover.

...
Computer Vision: A Modern Approach
Computer Vision: A Modern Approach

This extraordinary book gives a uniquely modern view of computer vision. Offering a general survey of the whole computer vision enterprise along with sufficient detail for readers to be able to build useful applications, this book is invaluable in providing a strategic overview of computer vision. With extensive use of probabalistic...

C++ Network Programming, Volume 2: Systematic Reuse with ACE and Frameworks
C++ Network Programming, Volume 2: Systematic Reuse with ACE and Frameworks

Do you need to develop flexible software that can be customized quickly? Do you need to add the power and efficiency of frameworks to your software? The ADAPTIVE Communication Environment (ACE) is an open-source toolkit for building high-performance networked applications and next-generation middleware. ACE's power and...

Longman Student Grammar of Spoken and Written English Workbook (Grammar Reference)
Longman Student Grammar of Spoken and Written English Workbook (Grammar Reference)

* invaluable for students on university and teacher-training courses* checks your knowledge of how English is actually used in speech and writing* shows how grammar differs in different contexts of registers* provides practice with relationships between grammar and vocabulary* all examples taken from naturally occurring English texts and...

Heuristic and Optimization for Knowledge Discovery
Heuristic and Optimization for Knowledge Discovery
With the large amount of data stored by many organizations, capitalists have observed that this information is an intangible asset. Unfortunately, handling large databases is a very complex process and traditional learning techniques are expensive to use. Heuristic techniques provide much help in this arena, although little is known about heuristic...
Real Time Programming: Languages, Specification & Verification
Real Time Programming: Languages, Specification & Verification

The primary aim of this monograph is to present the current research efforts that have gone into/or going on in the systematic design of real-time programs. Such an effort would help researchers and users in the area to get a clear picture of the issues of specification, verification and design of real-time reactive programs. It will clearly...

Workflow Management: Models, Methods, and Systems (Cooperative Information Systems)
Workflow Management: Models, Methods, and Systems (Cooperative Information Systems)
This book offers a comprehensive introduction to workflow management, the management of business processes with information technology. By defining, analyzing, and redesigning an organization's resources and operations, workflow management systems ensure that the right information reaches the right person or computer application at the right time....
Security Technologies for the World Wide Web, Second Edition
Security Technologies for the World Wide Web, Second Edition

This newly revised edition of the Artech House bestseller offers the most up-to-date comprehensive analysis of the current trends in WWW security available, with brand new chapters on authentication and authorization infrastructures, server-side security, and risk management. Practitioners will also find coverage of entirely new topics such as...

Virtual Machine Design and Implementation in C/C++ (With CD-ROM)
Virtual Machine Design and Implementation in C/C++ (With CD-ROM)
This guide provides an in-depth look at the construction and underlying theory of a fully functional virtual machine and an entire suite of related development tools.

With the emergence of multiplatform production systems and network-centric computing, the software industry has witnessed the resurgence of the virtual machine. Rather than...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy