Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Grey Information: Theory and Practical Applications (Advanced Information and Knowledge Processing)
Grey Information: Theory and Practical Applications (Advanced Information and Knowledge Processing)
This book is a crystallization of the authors' work over the last twenty-five years. The book covers the latest advances in grey information and systems research, providing a state-of-the-art overview of this important field. Covering the theoretical foundation, fundamental methods and main topics in grey information and systems research, this book...
Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
You own your own business. You have also created a website for your business that details the products or services that you offer, but it doesn't allow potential customers to purchase anything online. Don't risk losing business-learn to create a dynamic online environment using only three programs. PHP, MySQL and Apache are three popular...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Handbook of Natural Language Processing, Second Edition
Handbook of Natural Language Processing, Second Edition

As the title of this book suggests, it is an update of the first edition of the Handbook of Natural Language Processing which was edited by Robert Dale, Hermann Moisl, and Harold Somers and published in the year 2000. The vigorous growth of new methods in Natural Language Processing (henceforth, NLP) since then, strongly suggested that...

Sacred Places Around the World: 108 Destinations (Sacred Places: 108 Destinations series)
Sacred Places Around the World: 108 Destinations (Sacred Places: 108 Destinations series)

Human civilization in the 21st century can be defined by diversity and duality. One-fifth of the world’s population is Chinese, another fifth Muslim. A hundred million of us are homeless children living in extreme poverty. More than two percent of the human population is mentally retarded. There are over 10,000 spoken languages. Yet, a...

Cognitive Systems: Joint Chinese-German Workshop, Shanghai, China, March 7-11, 2005, Revised Selected Papers
Cognitive Systems: Joint Chinese-German Workshop, Shanghai, China, March 7-11, 2005, Revised Selected Papers
This book constitutes the thoroughly refereed post-proceedings of the Joint Chinese-German Workshop on Cognitive Systems held in Shanghai in March 2005.

The 13 revised papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book. The workshop served to present the current state of the art in the new...

A History of Mathematics: From Mesopotamia to Modernity
A History of Mathematics: From Mesopotamia to Modernity

A History of Mathematics covers the evolution of mathematics through time and across the major Eastern and Western civilizations. It begins in Babylon, then describes the trials and tribulations of the Greek mathematicians. The important, and often neglected, influence of both Chinese and Islamic mathematics is covered in detail,...

Progress on Cryptography: 25 Years of Cryptography in China
Progress on Cryptography: 25 Years of Cryptography in China
This workshop entitled “Progress on Cryptography: 25 Year of Cryptography in China” is being held during the celebration of Professor Guozhen Xiao’s 70th birthday. This proceeding is a birthday gift from all of his current and former graduate students, who have had the pleasure of being supervised by Professor Xiao during the last...
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g....
Scientific Computing with MATLAB and Octave (Texts in Computational Science and Engineering)
Scientific Computing with MATLAB and Octave (Texts in Computational Science and Engineering)

This textbook is an introduction to Scientific Computing, in which several numerical methods for the computer solution of certain classes of mathematical problems are illustrated. The authors show how to compute the zeros or the integrals of continuous functions, solve linear systems, approximate functions by polynomials and construct...

Fonts & Encodings
Fonts & Encodings

This reference is a fascinating and complete guide to using fonts and typography on the Web and across a variety of operating systems and application software. Fonts & Encodings shows you how to take full advantage of the incredible number of typographic options available, with advanced material that covers everything from...

Jews and Judaism in Modern China (Routledge Jewish Studies Series)
Jews and Judaism in Modern China (Routledge Jewish Studies Series)

Jews and Judaism in Modern China explores and compares the dynamics at work in two of the oldest, intact and starkly contrasting civilizations on earth; Jewish and Chinese. The book studies how they interact in modernity and how each civilization views the other, and analyses areas of cooperation between scholars, activists and...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy