Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Printed Circuits Handbook (McGraw Hill Handbooks)
Printed Circuits Handbook (McGraw Hill Handbooks)

The World's #1 Guide to Printed Circuit Boards_Now Completely Updated with the Latest Information on Lead-Free Manufacturing!

The best reference in the field for over 30 years, the Printed Circuits Handbook equips you with definitive coverage of every facet of printed circuit assemblies_from...

The Clean Coder: A Code of Conduct for Professional Programmers (Robert C. Martin Series)
The Clean Coder: A Code of Conduct for Professional Programmers (Robert C. Martin Series)

Programmers who endure and succeed amidst swirling uncertainty and nonstop pressure share a common attribute: They care deeply about the practice of creating software. They treat it as a craft. They are professionals.

 

In The Clean Coder: A Code of...

The Pythagorean Theorem: A 4,000-Year History
The Pythagorean Theorem: A 4,000-Year History

By any measure, the Pythagorean theorem is the most famous statement in all of mathematics, one remembered from high school geometry class by even the most math-phobic students. Well over four hundred proofs are known to exist, including ones by a twelve-year-old Einstein, a young blind girl, Leonardo da Vinci, and a future president of the...

Becoming a Tiger: How Baby Animals Learn to Live in the Wild
Becoming a Tiger: How Baby Animals Learn to Live in the Wild

It's a jungle out there. And survival is never a given. Somehow, a blind, defenseless tiger kitten must evolve into a deadly, efficient predator; a chimp must learn to distinguish edible plants from lethal poisons; a baby buffalo must be able to pick its mother out of a herd of hundreds. Contrary to common belief, not everything is...

Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
What do Einstein's theory of relativity, string theory, and lots of other mind-bending—and space-bending—revelations of modern physics have in common? None of them could have been discovered until scientists and mathematicians recognized an uncomfortable truth—that there was a reason the world's greatest mathematical minds had...
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011
Energy Minimization Methods in Computer Vision and Pattern Recognition: 8th International Conference, EMMCVPR 2011

Over the last few decades, energy minimization methods have become an established paradigm to resolve a variety of challenges in the fields of computer vision and pattern recognition. While traditional approaches to computer vision were often based on a heuristic sequence of processing steps and merely allowed a very limited...

Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010
Information Security Applications: 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010

The 11th International Workshop on Information Security Applications (WISA 2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea...

Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)
Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)

Humans receive the great majority of information about their environment through sight, and at least 50% of the human brain is dedicated to vision. Vision is also a key component for building artificial systems that can perceive and understand their environment. Computer vision is likely to change society in many ways; for example, it...

The Crucible of Consciousness: An Integrated Theory of Mind and Brain
The Crucible of Consciousness: An Integrated Theory of Mind and Brain
There are lots of books on consciousness being published these days, and I end up skimming most of them and reading a few of them. Reading somebody else’s take on the whole set of issues is often frustrating and depressing: they just don’t get it. Other times it is tantalizing; they start on the right foot, in other words, where I...
Mobile Commerce Applications
Mobile Commerce Applications
Today, various m-commerce applications are increasingly enhancing enterprises' abilities to offer mobile services that are easily accessed by a mobile device anytime and anywhere. With the unique advantages of emerging mobile communications and wireless technologies, m-commerce applications are generally used to fulfill some tasks that are not...
Result Page: 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy