Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algebraic Curves in Cryptography (Discrete Mathematics and Its Applications)
Algebraic Curves in Cryptography (Discrete Mathematics and Its Applications)

The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic...

Linear Models with R (Chapman & Hall/CRC Texts in Statistical Science)
Linear Models with R (Chapman & Hall/CRC Texts in Statistical Science)

Books on regression and the analysis of variance abound-many are introductory, many are theoretical. While most of them do serve a purpose, the fact remains that data analysis cannot be properly learned without actually doing it, and this means using a statistical software package. There are many of these to choose from as well, all with...

Handbook of Discrete and Computational Geometry
Handbook of Discrete and Computational Geometry

While books and journals of high quality have proliferated in discrete and compu- tational geometry during recent years, there has been to date no single reference work fully accessible to the nonspecialist as well as to the specialist, covering all the major aspects of both fields. The Handbook of Discrete and Computational Geometry...

Multi-Core Embedded Systems (Embedded Multi-Core Systems)
Multi-Core Embedded Systems (Embedded Multi-Core Systems)

This book is authored to address many challenging topics related to the multi-core embedded systems research area, starting with multi-core architectures and interconnects, embedded design methodologies for multi-core systems, to mapping of applications, programming paradigms and models of computation on multi-core embedded systems.

...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Spatial Cloud Computing: A Practical Approach
Spatial Cloud Computing: A Practical Approach

An exploration of the benefits of cloud computing in geoscience research and applications as well as future research directions, Spatial Cloud Computing: A Practical Approach discusses the essential elements of cloud computing and their advantages for geoscience. Using practical examples, it details the geoscience requirements of cloud...

Methods in Medical Informatics: Fundamentals of Healthcare Programming in Perl, Python, and Ruby
Methods in Medical Informatics: Fundamentals of Healthcare Programming in Perl, Python, and Ruby

Too often, healthcare workers are led to believe that medical informatics is a complex field that can only be mastered by teams of professional programmers. This is simply not the case. With just a few dozen simple algorithms, easily implemented with open source programming languages, you can fully utilize the medical information contained in...

Bayesian Data Analysis, Second Edition (Chapman & Hall/CRC Texts in Statistical Science)
Bayesian Data Analysis, Second Edition (Chapman & Hall/CRC Texts in Statistical Science)
This book is intended to have three roles and to serve three associated audiences: an introductory text on Bayesian inference star ting from first principles, a graduate text on effective current approaches to Bayesian modeling and computation in statistics and related fields, and a handbook of Bayesian meth ods in applied...
Fixed Mobile Convergence Handbook
Fixed Mobile Convergence Handbook

Requirements for next generation networks (NGNs) are fueling an architectural evolution. Service providers are obliged to give users access to content anytime, anyhow, anywhere, on any device. This requires a converged infrastructure in which users across multiple domains can be served through a single unified domain and all network services...

Joint Cognitive Systems: Foundations of Cognitive Systems Engineering
Joint Cognitive Systems: Foundations of Cognitive Systems Engineering
This book was written by pioneers in the field and offers a principled approach to studying human work with complex technology. … It seems destined to become a classic in the field.
- Books-on-Line

In the nine compact chapters of Joint Cognitive Systems (JCS), two recognized figures in the field of human factors provide an...

Microcontrollers: High-Performance Systems and Programming
Microcontrollers: High-Performance Systems and Programming

Focusing on the line of high-performance microcontrollers offered by Microchip, Microcontrollers: High-Performance Systems and Programming discusses the practical factors that make the high-performance PIC series a better choice than their mid-range predecessors for most systems. However, one consideration in favor of the mid-range...

Isosurfaces: Geometry, Topology, and Algorithms
Isosurfaces: Geometry, Topology, and Algorithms

Ever since Lorensen and Cline published their paper on the Marching Cubes algorithm, isosurfaces have been a standard technique for the visualization of 3D volumetric data. Yet there is no book exclusively devoted to isosurfaces. Isosurfaces: Geometry, Topology, and Algorithms represents the first book to focus on basic...

Result Page: 96 95 94 93 92 91 90 89 88 87 86 85 84 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy