Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Coding Theory: A First Course
Coding Theory: A First Course
"This book is well written and highly recommended for students and professionals in engineering, computer science, mathematics and related fields." Mathematical Reviews

Concerned with successfully transmitting data through a noisy channel, coding theory can be applied to electronic engineering and communications.
...
Justice for Some: Law and the Question of Palestine
Justice for Some: Law and the Question of Palestine

Justice in the Question of Palestine is often framed as a question of law. Yet none of the Israel-Palestinian conflict's most vexing challenges have been resolved by judicial intervention. Occupation law has failed to stem Israel's settlement enterprise. Laws of war have permitted killing and destruction during Israel's...

Perl Medic : Transforming Legacy Code
Perl Medic : Transforming Legacy Code
Bring new power, performance, and scalability to your existing Perl code!

Today's Perl developers spend 60-80% of their time working with existing Perl code. Now, there's a start-to-finish guide to understanding that code, maintaining it, updating it, and refactoring it for maximum performance and reliability. Peter J. Scott, lead author of...

Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML
Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML
Written to address technical concerns that mobile developers face regardless of platform, this book explores the differences between mobile and stationary applications and the architectural and software development concepts needed to build mobile applications. Using UML, Reza B'far guides the developer through the development process, from design...
Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery (Premier Reference Source)
Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery (Premier Reference Source)
Pattern Recognition has a long history of applications to data analysis in business, military and social economic activities. While the aim of pattern recognition is to discover the pattern of a data set, the size of the data set is closely related to the methodology one adopts for analysis. Intelligent Data Analysis: Developing New Methodologies...
Wireless Internet Security: Architecture and Protocols
Wireless Internet Security: Architecture and Protocols
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for...
Fast Algorithms for Signal Processing
Fast Algorithms for Signal Processing

Efficient signal processing algorithms are important for embedded and power-limited applications since, by reducing the number of computations, power consumption can be reduced significantly. Similarly, efficient algorithms are also critical to very large scale applications such as video processing and four-dimensional medical imaging. This...

Java How to Program, 7th Edition
Java How to Program, 7th Edition

The Deitels' groundbreaking How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. The Seventh Edition has been extensively fine-tuned and is completely up-to-date with Sun Microsystems, Inc.’s...

Humanomics: Moral Sentiments and the Wealth of Nations for the Twenty-First Century (Cambridge Studies in Economics, Choice, and Society)
Humanomics: Moral Sentiments and the Wealth of Nations for the Twenty-First Century (Cambridge Studies in Economics, Choice, and Society)
While neoclassical analysis works well for studying impersonal exchange in markets, it fails to explain why people conduct themselves the way they do in their personal relationships with family, neighbors, and friends. In Humanomics, Nobel Prize-winning economist Vernon L. Smith and his long-time co-author Bart J. Wilson bring their study of...
Mass Dimension One Fermions (Cambridge Monographs on Mathematical Physics)
Mass Dimension One Fermions (Cambridge Monographs on Mathematical Physics)
In 2005, Dharam Ahluwalia and Daniel Grumiller reported an unexpected theoretical discovery of mass dimension one fermions. These are an entirely new class of spin one half particles, and because of their mass dimensionality mismatch with the standard model fermions they are a first-principle dark matter candidate. Written by one of the...
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

Handbook of Space Astronomy and Astrophysics
Handbook of Space Astronomy and Astrophysics

Fully updated with data from space-based observations and a comprehensive index and bibliography, this third edition contains the most frequently used information in modern astrophysics. As well as a vast number of tables, graphs, diagrams and formulae it also contains information covering topics including atomic physics, nuclear physics,...

unlimited object storage image
Result Page: 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy