Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Scratch by Example: Programming for All Ages
Scratch by Example: Programming for All Ages
This is a book about learning the Scratch language so that you can use it in teaching and other instructional situations. The book explains the visual nature of the language, showing you how to write programs by dragging and dropping visual blocks representing common compute operations. 

Scratch is visual...
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)

The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world’s most important block cipher. In...

Automatic Algorithm Recognition and Replacement: A New Approach to Program Optimization
Automatic Algorithm Recognition and Replacement: A New Approach to Program Optimization
Optimizing compilers have a fundamental problem. No matter how powerful their optimizations
are, they are no substitute for good application algorithms. Consider the case of
sorting. For sufficiently large data sets, a merge sort algorithm compiled with a less powerful
optimizer will always out-perform a selection sort algorithm
...
Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

Writing from Start to Finish: A Six-Step Guide
Writing from Start to Finish: A Six-Step Guide
"Can help you knock out writers block" -- Boston Herald

Ideal for writing a short story, essay, review, or report, this guide provides beginning writers with the hands-on direction they need to improve their writing techniques and ability. Using a six-step approach to writing, this resource covers
...
The Art of Error Correcting Coding
The Art of Error Correcting Coding
Building on the success of the first edition, which offered a practical introductory approach to the techniques of error concealment, this book, now fully revised and updated, provides a comprehensive treatment of the subject and includes a wealth of additional features. The Art of Error Correcting Coding, Second Edition explores...
2D Unity: Your First Game from Start to Finish
2D Unity: Your First Game from Start to Finish

Have you ever wanted to make a video game, but didn't know where to start? 2D Unity is an approachable guide to making your own games using Unity, the powerful, free-to-use development platform.

2D Unity contains hands-on projects that get you started making games from the ground-up. Unity's complex...

Continuous Delivery and DevOps: A Quickstart guide
Continuous Delivery and DevOps: A Quickstart guide

Streamline and optimize your workflow with this fast and engaging guide to continuous delivery and DevOps. Delivering quality software every time will become a way of life.

Overview

  • Real world and realistic examples of how to go about implementing continuous delivery and DevOps
  • Learn...
Practical Aspects of Interview and Interrogation-Soft Cover
Practical Aspects of Interview and Interrogation-Soft Cover
What makes a person confess to a crime he did not commit? Was he coerced? Is he trying to protect someone else? Interrogation has come under attack as opponents focus on false confessions. However, most cases are still resolved by confession, not forensic evidence. Among the new topics covered in the Second Edition of this bestselling book,...
Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Spatial Simulation: Exploring Pattern and Process
Spatial Simulation: Exploring Pattern and Process

A ground-up approach to explaining dynamic spatial modelling for an interdisciplinary audience.

Across broad areas of the environmental and social sciences, simulation models are  an important way to study systems inaccessible to scientific experimental and observational methods, and also an essential complement to...

Learning Analytics in R with SNA, LSA, and MPIA
Learning Analytics in R with SNA, LSA, and MPIA

This book introduces Meaningful Purposive Interaction Analysis (MPIA) theory, which combines social network analysis (SNA) with latent semantic analysis (LSA) to help create and analyse a meaningful learning landscape from the digital traces left by a learning community in the co-construction of knowledge.    

...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy