Home | Amazing | Today | Tags | Publishers | Years | Search 
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions

Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled with countless stories of product successes and failures— fickle consumer adoptions, clever marketing campaigns that outsmart the best technologies, better packaging winning over better technology, and products that are simply...

Creating a Winning E-Business
Creating a Winning E-Business

Creating a Winning E-Business, Second Edition provides general business students, graduate students, continuing education students, executive education seminar participants, and entrepreneurs with practical ideas on planning and creating an e-business. We assume that readers have no previous e-business knowledge or experience. This book...

Demand-Driven Associative Classification (SpringerBriefs in Computer Science)
Demand-Driven Associative Classification (SpringerBriefs in Computer Science)

The ultimate goal of computers is to help humans to solve problems. The solutions for such problems are typically programmed by experts, and the computers need only to follow the specified steps to solve the problem. However, the solution of some problems may be too difficult to be explicitly programmed. In such difficult cases,...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Problem Solving and Programming Concepts (9th Edition)
Problem Solving and Programming Concepts (9th Edition)

Knowledge of problem solving and programming concepts is necessary for those who develop applications for users. Unfortunately, many students have greater difficulty with problem solving than they do with the syntax of computer languages. The art of programming is learning multiple techniques and applying those techniques to specific...

Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)
Self-organising Software: From Natural to Artificial Adaptation (Natural Computing Series)

Stable and dependable IT services and infrastructures are nowadays of paramount importance not only for modern enterprises but also for home users. However, as distributed information infrastructures continue to spread and grow, resulting in Internet-based, wireless and mobile systems, traditional solutions for managing and...

R for SAS and SPSS Users (Statistics and Computing)
R for SAS and SPSS Users (Statistics and Computing)

While SAS and SPSS have many things in common, R is very different. My goal in writing this book is to help you translate what you know about SAS or SPSS into a working knowledge of R as quickly and easily as possible. I point out how they differ using terminology with which you are familiar, and show you which add-on packages will...

Library and Information Center Management (Library and Information Science Text Series)
Library and Information Center Management (Library and Information Science Text Series)

Thirty years ago, when the first edition of this book was published, little had been written about the management of libraries and information centers. Those seeking advice, examples, and information about how to manage libraries were forced to search for answers in the literature of public administration or business management. Since...

Guide to ILDJIT (SpringerBriefs in Computer Science)
Guide to ILDJIT (SpringerBriefs in Computer Science)

We are all familiar with the time-honored idea of a Virtual Machine that is neutral with respect to computer architecture and can be used to execute a high-level language, after its translation to the VM byte-code. This approach can be found in several successful mono-language systems, that support popular languages such as Java or...

Speech Processing and Soft Computing
Speech Processing and Soft Computing

Soft Computing (SC) techniques have been recognized nowadays as attractive solutions for modeling highly nonlinear or partially defined complex systems and processes. These techniques resemble biological processes more closely than conventional (more formal) techniques. However, despite its increasing popularity, soft computing lacks...

Object-Oriented and Classical Software Engineering
Object-Oriented and Classical Software Engineering

Almost every computer science and computer engineering curriculum now includes a required team-based software development project. In some cases, the project is only one semester or quarter in length, but a year-long team-based software development project is fast becoming the norm.

In an ideal world, every student would...

Result Page: 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy