Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Theory, Inference and Learning Algorithms
Information Theory, Inference and Learning Algorithms
"...a valuable reference...enjoyable and highly useful." American Scientist

"...an impressive book, intended as a class text on the subject of the title but having the character and robustness of a focused encyclopedia. The presentation is finely detailed, well documented, and stocked with artistic flourishes."
...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

Securing Windows 2000 Step by Step
Securing Windows 2000 Step by Step
This guide is the joint product of a community of Windows security managers and experts, who have voluntarily shared their experiences in this field so that others may benefit. The guide can be used to substantially improve the security of Windows 2000 computers and networks.

Just as Windows 2000 is the next evolution of Windows NT 4.0,
...
Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems
Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems
A new approach to the study of arithmetic circuits

In Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems, the authors take a novel approach of presenting methods and examples for the synthesis of arithmetic circuits that better reflects the needs of today's computer system designers and engineers....

Visual Basic 2005 Cookbook: Solutions for VB 2005 Programmers (Cookbooks)
Visual Basic 2005 Cookbook: Solutions for VB 2005 Programmers (Cookbooks)

This book will help you solve more than 300 of the most common and not-so-common tasks that working Visual Basic 2005 programmers face every day. If you're a seasoned .NET developer, beginning Visual Basic programmer, or a developer seeking a simple and clear migration path from VB6 to Visual Basic 2005, the ...

Microsoft Visual Basic .NET Programmer's Cookbook
Microsoft Visual Basic .NET Programmer's Cookbook

Filled with the ingredients developers need--code samples, instructions, and solutions to common problems--this book is the logical place for developers to start building projects and learning more about Visual Basic .NET.


Next time you hit the wall with a tough Visual Basic .NET problem, get the code behind the...

Wireless Security: Models, Threats, and Solutions
Wireless Security: Models, Threats, and Solutions
REAL-WORLD WIRELESS SECURITY

This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to...

Microsoft ASP.NET Setup and Configuration Pocket Reference
Microsoft ASP.NET Setup and Configuration Pocket Reference
This hands-on, one-stop guide delivers the focused, streamlined direction you need to get your Web solutions up and running quickly. Zero in on key ASP.NET configuration details and techniques using quick-reference tables, lists, coding and more.

This pocket-sized reference is the Web application developer’s fast-answers guide to...

Inside Internet Security: What Hackers Don't Want You To Know
Inside Internet Security: What Hackers Don't Want You To Know
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business....
The Worldwide History of Telecommunications
The Worldwide History of Telecommunications
The first comprehensive history of the Information Age how we got there and where we are going

The exchange of information is essential for both the organization of nature and the social life of mankind. Until recently, communication between people was more or less limited by geographic proximity. Today, thanks to ongoing innovations in...

The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
"Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break," writes David Kahn in this massive (almost 1,200 pages) volume. Most of The Codebreakers focuses on the 20th century, especially World War II. But its reach is...
Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory (Foundations and Trends(R) in Communications and Information Theory)
Network Coding Theory provides a tutorial on the basic of network coding theory. It presents the material in a transparent manner without unnecessarily presenting all the results in their full generality. Store-and-forward had been the predominant technique for transmitting information through a network until its optimality was refuted by network...
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy