Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
History of the Later Roman Empire: From the Death of Theodosius I to the Death of Justinian (Volume 1)
History of the Later Roman Empire: From the Death of Theodosius I to the Death of Justinian (Volume 1)
The first of these two volumes might be entitled the "German Conquest of Western Europe," and the second the "Age of Justinian." The first covers more than one hundred and twenty years, the second somewhat less than fifty. This disparity is a striking illustration of the fact that...
Advanced Artificial Intelligence (Series on Intelligence Science)
Advanced Artificial Intelligence (Series on Intelligence Science)

Artificial Intelligence's long-term goal is to build the human level of artificial intelligence. AI was born 50 years ago, in the bumpy road has made encouraging progress, in particular, machine learning, data mining, computer vision, expert systems, natural language processing, planning, robotics and related applications have...

The Trading Book: A Complete Solution to Mastering Technical Systems and Trading Psychology
The Trading Book: A Complete Solution to Mastering Technical Systems and Trading Psychology

THE SMARTEST TRADES.
THE HOTTEST MARKETS.
THE ONLY BOOK YOU NEED.

You don’t have to be a professional trader to win big in the stock market. That’s what Anne-Marie Baiynd learned when she changed her career from neuroscience researcher to full-time momentum trader. Now, with her popular website...

Functional Programming in C#: Classic Programming Techniques for Modern Projects (Wrox Programmer to Programmer)
Functional Programming in C#: Classic Programming Techniques for Modern Projects (Wrox Programmer to Programmer)

FUNCTIONAL PROGRAMMING is an important paradigm of programming that looks back on a long history. The subject has always been very relevant to people who teach others how to program — the clean and logical concepts of functional programming lend themselves especially well to teaching. Certain industries that use computers and self...

50 Tips and Tricks for MongoDB Developers
50 Tips and Tricks for MongoDB Developers

Getting started with MongoDB is easy, but once you’re building applications with it more complex questions emerge. Is it better to store data using this schema or that one? Should I break this into two documents or store it all as one? How can I make this faster? The advice in this book should help you answer these...

Compiler Construction Using Java, JavaCC, and Yacc
Compiler Construction Using Java, JavaCC, and Yacc

Broad in scope, involving theory, the application of that theory, and programming technology, compiler construction is a moving target, with constant advances in compiler technology taking place. Today, a renewed focus on do-it-yourself programming makes a quality textbook on compilers, that both students and instructors will enjoy using, of...

CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

The industry-leading study guide for the CISA exam, fully updated

More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated...

Random Matrix Methods for Wireless Communications
Random Matrix Methods for Wireless Communications

Blending theoretical results with practical applications, this book provides an introduction to random matrix theory and shows how it can be used to tackle a variety of problems in wireless communications. The Stieltjes transform method, free probability theory, combinatoric approaches, deterministic equivalents and spectral analysis methods...

Implementing SSL / TLS Using Cryptography and PKI
Implementing SSL / TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or...

Food Additives Data Book
Food Additives Data Book

The use of additives in food is a dynamic one, as consumers demand fewer additives in foods and as governments review the list of additives approved and their permitted levels. Scientists also refine the knowledge of the risk assessment process as well as improve analytical methods and the use of alternative additives, processes or...

Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Result Page: Previous 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy