Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Industrial Applications of Semantic Web: Proceedings of the 1st International IFIP/WG12.5
Industrial Applications of Semantic Web: Proceedings of the 1st International IFIP/WG12.5
The Semantic Web, that adds a conceptual layer of machine-understandable metadata to the existing content, will make the content available for processing by intelligent software allowing automatic resource integration and providing interoperability between heterogeneous systems. The Semantic Web is now the most important influence on the...
Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, Third Edition
Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, Third Edition
Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, Third Edition,
supplements your classroom and laboratory experience with the Cisco Networking
Academy Program, whose curriculum is designed to empower you to enter employment
or further education and training in the computer networking field.

This book trains
...
Gravity from the Ground Up: An Introductory Guide to Gravity and General Relativity
Gravity from the Ground Up: An Introductory Guide to Gravity and General Relativity
"...the text is...inviting, with exercises that have real-world application, such as exploring the energy of photons that cause sunburn." Stuart J. Goldman, Sky & Telescope

"Delightfully throrough yet easy to read." American Scientist

This book provides an accessible introduction to
...
Modern Operating Systems (3rd Edition) (GOAL Series)
Modern Operating Systems (3rd Edition) (GOAL Series)

A presentation of the basics of both distributed and single-processor computer systems, this book reflects real-world experience that provides practical, hands- on information in constructing and understanding modern operating systems. This book discusses the key principles of both kinds of systems — including MS- DOS, UNIX, Amoeba, and...

The Role of Labour Mobility and Informal Networks for Knowledge Transfer
The Role of Labour Mobility and Informal Networks for Knowledge Transfer
The purpose of this volume is to analyze the microfoundations of knowledge spillovers. The microeconomic analysis of spillovers leads to the insight that the spillover and flow of knowledge is not at all automatic. Instead, this volume suggests that a filter exists between knowledge and its economic application. The focus of this volume is on...
Computer Science & Artificial Intelligence
Computer Science & Artificial Intelligence
The Panel on Computer Science and Artificial Intelligence was established in early 1992 by the Naval
Studies Board (NSB) of the National Research Council in response to a request from the Naval Research
Laboratory (NRL). The NRL called on the NSB to establish a panel of experts in the fields of computer science
and artificial
...
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Digital Convergence - Libraries of the Future
Digital Convergence - Libraries of the Future
Clay tablets have been used to keep records from the earliest times. However, they were used for archives rather than libraries and consisted mainly of administrative records.Private and personal libraries containing books first appeared in Greece in the 5th century BC.The Royal Library of Alexandria was founded in the 3rd century BC and was...
Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
Artificial Crime Analysis Systems: Using Computer Simulations and Geographic Information Systems
In the last decade there has been a phenomenal growth in interest in crime pattern analysis. Geographic information systems are now widely used in urban police agencies throughout industrial nations. With this, scholarly interest in understanding crime patterns has grown considerably.

Artificial Crime Analysis Systems: Using Computer...

Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide
Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide

Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide is a Cisco® authorized learning tool for CCNP preparation. As part of the Cisco Press foundation learning series, this book covers how to maintain and monitor complex enterprise networks.

...

Mastering Red Hat Linux 7
Mastering Red Hat Linux 7
Join the Red Hat Revolution!
Newly revised and updated, Mastering Red Hat Linux is the essential guide to the world's leading Linux distribution. Inside, you'll find everything you need to know to install, configure, use, and optimize Red Hat Linux. You'll even find the operating system itself-the Publisher's Edition of Red Hat Linux 7.1,
...
unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy