|
|
|
|
Network+ Certification Study Guide, Third EditionThis book’s primary objective is to help you prepare for and pass the required Network+ exam so you can begin to reap the career benefi ts of certifi cation. We believe that the only way to do this is to help you increase your knowledge and build your skills. After completing this book, you should feel confi dent that you have thoroughly... | | RFID Handbook: Applications, Technology, Security, and PrivacyRadio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it... | | Transport Equations in Biology (Frontiers in Mathematics)This book presents models written as partial differential equations and originating from various questions in population biology, such as physiologically structured equations, adaptive dynamics, and bacterial movement. Its purpose is to derive appropriate mathematical tools and qualitative properties of the solutions (long time behavior,... |
|
Fuzzy Control SystemsMust reading for anyone interested in acquiring a thorough understanding of fuzzy logic, its role in soft computing, and its application to control and related fields.
-Lotfi A. Zadeh From the Foreword
Fuzzy Control Systems explores one of the most active areas of research involving fuzzy set theory. The... | | Genetic Algorithms in Electromagnetics
A thorough and insightful introduction to using genetic algorithms to optimize electromagnetic systems
Genetic Algorithms in Electromagnetics focuses on optimizing the objective function when a computer algorithm, analytical model, or experimental result describes the performance of an electromagnetic system. It... | | Real World Linux Security (2nd Edition)
Stop today's most vicious Internet attackers—right in their tracks!
Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or... |
|
|
|
|
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 |