Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Temporal Type Theory: A Topos-Theoretic Approach to Systems and Behavior (Progress in Computer Science and Applied Logic)
Temporal Type Theory: A Topos-Theoretic Approach to Systems and Behavior (Progress in Computer Science and Applied Logic)
This innovative monograph explores a new mathematical formalism in higher-order temporal logic for proving properties about the behavior of systems. Developed by the authors, the goal of this novel approach is to explain what occurs when multiple, distinct system components interact by using a category-theoretic description of behavior...
CCNP Security Firewall 642-617 Official Cert Guide
CCNP Security Firewall 642-617 Official Cert Guide

CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...

Guide to RISC Processors: for Programmers and Engineers
Guide to RISC Processors: for Programmers and Engineers
Popular processor designs can be broadly divided into two categories: Complex Instruction
Set Computers (CISC) and Reduced Instruction Set Computers (RISC). The dominant
processor in the PC market, Pentium, belongs to the CISC category. However, the recent
trend is to use the RISC designs. Even Intel has moved from CISC to RISC
...
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Learn the differences between various log aggregation and correlation systems
  • Examine regulatory and industry requirements
  • Evaluate various deployment scenarios
  • Properly size your deployment
  • Protect the Cisco Security MARS appliance from attack
  • Generate reports,...
Buying & Selling Jewelry on eBay (Buying & Selling on Ebay)
Buying & Selling Jewelry on eBay (Buying & Selling on Ebay)
In recent years, U.S. jewelry sales on the Internet have grown to nearly $3 billion yearly, a figure attained in part because of the popularity of eBay. "Buying & Selling Jewelry on eBay" walks you through the process of using eBay to both purchase and purvey jewelry-from finding the perfect gem and the right style of jewelry to...
Forensic Science
Forensic Science

This is a comprehensive reference source on the theory, techniques, and application of the various forensic sciences.The past decade has seen an explosion of interest in the application of scientific techniques to investigations of crime. Television audiences have developed a seemingly insatiable appetite for shows such as CSI: Crime Scene...

Tietz's Applied Laboratory Medicine
Tietz's Applied Laboratory Medicine

Using a problem-based approach, Tietz's Applied Laboratory Medicine, Second Edition presents interesting cases to illustrate the current use and interpretation of the most commonly available clinical laboratory tests. The cases present detailed descriptions of the symptoms, diagnosis, and treatment of disease. The book...

Lucid Waking: The Answer to the Problem of Consciousness
Lucid Waking: The Answer to the Problem of Consciousness
There is no problem more baffling to the academic world than the problem of consciousness. It’s fair to say that no academic has any clue at all about what consciousness is. In fact, academics have totally confused it with something radically different, namely sentience. The problem that faces the academic world is the insurmountable one...
Red Hat Enterprise Linux 5 Administration Unleashed
Red Hat Enterprise Linux 5 Administration Unleashed
This comprehensive guide can help you administer Red Hat Enterprise Linux 5 effectively in any production environment, no matter how complex or challenging.

 

Long-time Red Hat insider Tammy Fox brings together today’s best practices for the entire system lifecycle, from planning and...

PIC Microconrtoller and embedded systems
PIC Microconrtoller and embedded systems

Products using microprocessors generally fall into two categories. The first category uses high-performance microprocessors such as the Pentium in applications where system performance is critical. We have an entire book dedicated to this topic, The 80x86 IBM PC and Compatible Computers, Volumes / and //, from Prentice Hall, in the second...

Managing the Design Process-Concept Development: An Essential Manual for the Working Designer
Managing the Design Process-Concept Development: An Essential Manual for the Working Designer
Every aspect of business is impacted by design—from the products or services a company provides, to the various forms of communications that express these products and services, to the many environments, physical or virtual, where customers interact with these offerings. Graphic design can captivate, persuade, motivate, and delight....
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision Systems: 8th International Conference, ICVS 2011, Sophia Antipolis, France, September 20-22, 2011, Proceedings
Computer Vision is the science and technology of machines that see. The dominant scientific conferences in computer vision, such as ICCV, CVPR and ECCV, concentrate on theories and models for obtaining information from images and image sequences. The intensely competitive nature of these conferences leaves little room to...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy