Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algorithms in C++, Parts 1-4: Fundamentals, Data Structure, Sorting, Searching (3rd Edition) (Pts. 1-4)
Algorithms in C++, Parts 1-4: Fundamentals, Data Structure, Sorting, Searching (3rd Edition) (Pts. 1-4)

Robert Sedgewick has thoroughly rewritten and substantially expanded and updated his popular work to provide current and comprehensive coverage of important algorithms and data structures. Christopher Van Wyk and Sedgewick have developed new C++ implementations that both express the methods in a concise and direct manner, and...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Computational Finance Using C and C# (Quantitative Finance)
Computational Finance Using C and C# (Quantitative Finance)
In Computational Finance Using C and C# George Levy raises computational finance to the next level using the languages of both standard C and C#. The inclusion of both these languages enables readers to match their use of the book to their firms internal software and code requirements. Levy also provides derivatives pricing information for:
...
Java Swing, Second Edition
Java Swing, Second Edition
This second edition of Java Swing thoroughly covers all the features available in Java 2 SDK 1.3 and 1.4. More than simply a reference, this new edition takes a practical approach. It is a book by developers for developers, with hundreds of useful examples, from beginning level to advanced, covering every component...
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Over the last two or three decades, elliptic curves have been playing an increasingly important role both in number theory and in related fields such as cryptography. For example, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality...
Exploring Java (Java (Addison-Wesley))
Exploring Java (Java (Addison-Wesley))

The second edition of Exploring Java, introduces the basics of Java, the object-oriented programming language for networked applications from Sun Microsystems. This book covers the essentials of hot topics like Beans and RMI and shows you how to get up speed writing Java applets and other applications, including networking...

IBM Cognos 8 Planning
IBM Cognos 8 Planning
Business planning is no longer just about defining goals, identifying critical issues, and then mapping out strategies. In today's dynamic and highly competitive business environment, companies with complex business models want their abstract strategies turned into discrete, executable plans. They want information from the field to reach decision...
Information Retrieval - SciFinder
Information Retrieval - SciFinder
SciFinder® is rapidly becoming a preferred means to access scientific information in industry and universities worldwide. It accesses databases which span the chemical, engineering, life, medical, and physical sciences, including five Chemical Abstract Service databases and the National Library of Medicine bibliographic database...
Compiler Design: Virtual Machines
Compiler Design: Virtual Machines

While compilers for high-level programming languages are large complex software systems, they have particular characteristics that differentiate them from other software systems. Their functionality is almost completely well-defined – ideally there exist complete precise descriptions of the source and target languages, while additional...

Hierarchical Voronoi Graphs: Spatial Representation and Reasoning for Mobile Robots
Hierarchical Voronoi Graphs: Spatial Representation and Reasoning for Mobile Robots

Voronoi graphs and their hierarchical extensions have become a widely used tool for deriving abstract spatial representations from environmental data. They are currently being studied and applied in several subfields of computer science such as AI and robotics, computational geometry, and geoinformatics.

This book investigates the...

Design for Software: A Playbook for Developers
Design for Software: A Playbook for Developers

A unique resource to help software developers create a desirable user experience

Today, top-flight software must feature a desirable user experience. This one-of-a-kind book creates a design process specifically for software, making it easy for developers who lack design background to create that compelling user experience....

Modern Compiler Implementation in C
Modern Compiler Implementation in C

This new, expanded textbook describes all phases of a modern compiler: lexical analysis, parsing, abstract syntax, semantic actions, intermediate representations, instruction selection via tree matching, dataflow analysis, graph-coloring register allocation, and runtime systems. It includes good coverage of current techniques in code...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy