Home | Amazing | Today | Tags | Publishers | Years | Search 
Building Expert Systems in Prolog (Springer Compass International)
Building Expert Systems in Prolog (Springer Compass International)
This book is aimed at the Prolog programmer interested in either building expert systems or experimenting with various expert system techniques. Dennis Merritt chooses a step-by-step approach to building systems, explaining the concepts and showing the Prolog code at each stage. The book builds on simple beginning systems and progresses up to...
Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control
Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control

Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control summarizes the research on the performance of Bluetooth networks, including both piconets and scatternets, conducted since 2001. The book provides insights into the performance of Bluetooth networks through an analytical approach based upon...

Data Communications Networking Devices: Operation, Utilization and Lan and Wan Internetworking, 4th Edition
Data Communications Networking Devices: Operation, Utilization and Lan and Wan Internetworking, 4th Edition
Data Communications Networking Devices Operation, Utilization and LAN and VAN Internetworking Fourth Edition Gilbert Held 4-Degree Consulting, Macon, Georgia, USA Data communications continue to grow enormously as a key part of telecommunications. Technological advances mean up-to-date information is essential. This fourth edition of the popular...
.NET Windows Forms in a Nutshell
.NET Windows Forms in a Nutshell

This book is intended for C# and Visual Basic .NET developers who are writing Windows Forms applications. If you are moving from previous Windows GUI technologies such as Visual Basic 6.0 or MFC, or from those of other platforms such as Swing, or even if you are new to writing Windows applications, the tutorial section provides a complete...

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the...

The Security Development Lifecycle
The Security Development Lifecycle
The software industry has been struggling with how to create and release software that is more security-enhanced and reliable— the Security Development Lifecycle (SDL) provides a methodology that works. Adapted from Microsoft's standard development process, SDL is a critical way to help reduce the number of security defects in code at every...
Access 2007: The Missing Manual
Access 2007: The Missing Manual
Compared to industrial-strength database products such as Microsoft's SQL Server, Access is a breeze to use. It runs on PCs rather than servers and is ideal for small- to mid-sized businesses and households. But Access is still intimidating to learn. It doesn't help that each new version crammed in yet another set of features; so many, in fact,...
Mobile IP Technology for M-Business
Mobile IP Technology for M-Business
Here's a first-of-its-kind book that introduces you to the next generation of mobile networks, where IP data capability and mobile communications become integrated to form new, cutting-edge Mobile IP networks. This unique resource offers you a thorough understanding of the convergence of mobile and data technology. It explains how the prospect of...
Learn the MFC C++ Classes
Learn the MFC C++ Classes
It is not necessary to learn the Windows API in order to begin using the
Microsoft Foundation Class (MFC) Library of C++ classes; you do not even
have to know more than a few basic C++ concepts in order to begin. I have
been teaching extension classes through the University of California, Berkeley,
since 1993. My students have
...
BEA WebLogic Platform 7
BEA WebLogic Platform 7
Distributed software development, in which the user interfaces are distinct from the business logic, and the business logic is separate from the persistent data store, takes some getting used to. Not only do you have to grasp the concepts, but also the peculiarities of the development and run-time environments in which you're working--usually BEA...
AutoCAD 2005 and AutoCAD LT 2005 Bible
AutoCAD 2005 and AutoCAD LT 2005 Bible
If AutoCAD 2005 or AutoCAD LT 2005 can do it, you can do it too...

If you have invested in AutoCAD 2005 or AutoCAD LT 2005, you want to get the most from these top quality tools. This comprehensive guidebook gives you a ready reference on every detail of both products. The Chapter 1 tutorial gets you...

Secure Communicating Systems: Design, Analysis, and Implementation
Secure Communicating Systems: Design, Analysis, and Implementation
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical...
Result Page: 843 842 841 840 839 838 837 836 835 834 833 832 831 830 829 828 827 826 825 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy