Algorithmic Game Theory In the last few years game theory has had a substantial impact on computer science, especially on Internet- and e-commerce-related issues. More than 40 of the top researchers in this field have written chapters that go from the foundations to the state of the art. Basic chapters on algorithmic methods for equilibria, mechanism design and... The Concise Guide to DNS and BIND The Concise Guide to DNS and BIND provides the technical depth and expert-level information needed to understand and administer DNS and BIND. Domain Name System (DNS) is a distributed Internet directory service. It is used mainly to translate between domain names and IP addresses, and to control Internet email... MP3: The Definitive Guide MP3, standing for MPEG-1, Layer 3, is a codec for compressing the size of audio files for digital distribution. Much more than a definition, MP3 is nothing less than a cultural and economic revolution on the Internet. Every day, hundreds of thousands of MP3 music files are searched for, shared, recorded and listened to by computer and Internet...
Equidistribution in Number Theory, An Introduction
From July 11th to July 22nd, 2005, a NATO advanced study institute, as part
of the series “S´eminaire de math´ematiques sup´erieures”, was held at the Universit
´e de Montr´eal, on the subject Equidistribution in the theory of numbers.
There were about one hundred participants from sixteen... The Lanczos Method: Evolution and Application (Software, Environments and Tools) 'I recommend this book to anyone who wants to appreciate the often subtle interactions between algorithm research and engineering applications. For the engineer, it comprehensively summarizes 25 years of intellectual development in the understanding of the basic Lanczos algorithm and its many variants. For the numerical analysts, it describes the... sendmail, 3rd Edition The new edition of sendmail has been completely revised to cover sendmail 8.12--a version with more features and fundamental changes than any previous version of the Unix-based email routing program. Because the latest version of sendmail differs so significantly from earlier versions, a massive rewrite of this...
Handbook of Computer Crime Investigation: Forensic Tools & Technology Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital...
|Result Page: 16 15 14 13 12 11 10 9 8 7 |