Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mike Meyers' A+ Certification Passport, Second Edition
Mike Meyers' A+ Certification Passport, Second Edition

Get on the road to becoming A+ certified with this concise, affordable study tool. Certification training guru Mike Meyers along with Martin Acuna will guide you on your career path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the test, this Certification Passport...

Algorithm Design for Networked Information Technology Systems
Algorithm Design for Networked Information Technology Systems

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...

Cyberspace Textuality: Computer Technology and Literary Theory
Cyberspace Textuality: Computer Technology and Literary Theory
Computers were once thought of as number-crunching machines; but for most of us it is their ability to create worlds and process words that have made them into a nearly indispensable part of life. As Jacques Leslie puts it, if computers are everywhere, it is because they have grown into "poetry machines." The term "cyberspace"...
IP-Traffic Theory and Performance (Signals and Communication Technology)
IP-Traffic Theory and Performance (Signals and Communication Technology)
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.

The book provides an ideal starting point for detailed studies of traffic analysis...

From Writing to Computers
From Writing to Computers
... the broad and clear analysis of writing and language, and of automata theory, formal logic, and computability theory he uses to reach [his conclusion] is well worth reading.
–H. D. Warner, Western New England College

From Writing to Computers takes as its central theme the issue of a
...
Nonparametric System Identification
Nonparametric System Identification
Presenting a thorough overview of the theoretical foundations of non-parametric system identification for nonlinear block-oriented systems, this books shows that non-parametric regression can be successfully applied to system identification, and it highlights the achievements in doing so. With emphasis on Hammerstein, Wiener systems, and their...
Advances in Computer-Supported Learning
Advances in Computer-Supported Learning
The Internet and growth of computer networks have eliminated geographic barriers, creating an environment where education can be brought to a student no matter where that student may be. The success of distance learning programs and the availability of many Web-supported applications and multimedia resources have increased the effectiveness of...
Fine- and Coarse-Grain Reconfigurable Computing
Fine- and Coarse-Grain Reconfigurable Computing
Stamatis Vassiliadis was born in the small village of Manolates, on the Mediterranean island of Samos, Greece on July 19th, 1951. He passed away on April 7th, 2007 in Pijnacker, in the Netherlands. In between, he led a very remarkable life. As a child, he walked many kilometers through the mountains to reach his school and would study at night...
Mathematics for 3D Game Programming and Computer Graphics, Third Edition
Mathematics for 3D Game Programming and Computer Graphics, Third Edition

This updated third edition illustrates the mathematical concepts that a game developer needs to develop 3D computer graphics and game engines at the professional level. It starts at a fairly basic level in areas such as vector geometry and linear algebra, and then progresses to more advanced topics in 3D programming such as illumination and...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

unlimited object storage image
Result Page: 613 612 611 610 609 608 607 606 605 604 603 602 601 600 599 598 597 596 595 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy