Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
"Thought-provoking and far-sighted, this book provides a detailed analysis of the legal issues involved in on-line business and how a new generation of electronic agents can help. If you’re grappling with these issues today—or if you just want to see what’s coming tomorrow—this book is an excellent place to...
Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Evolvable Hardware (Genetic and Evolutionary Computation)
Evolvable Hardware (Genetic and Evolutionary Computation)
Evolvable hardware (EHW) refers to hardware whose architecture/structure and functions change dynamically and autonomously in order to improve its performance in carrying out tasks. The emergence of this field has been profoundly influenced by the progress in reconfigurable hardware and evolutionary computation. Traditional hardware can be...
Taoism For Dummies
Taoism For Dummies

The definitive guide to understanding Taoism—no matter your background or faith

Lao Tzu's Tao Te Ching is the second most translated book in the world, and the practice of religious Taoism is on the rise in China, where adherents currently number in the hundreds of millions. Yet there remains a remarkable...

Scala in Depth
Scala in Depth
In fall 2010 Michael Stephens from Manning contacted me about writing a Scala Book. I was working for a small virtualization/security startup where I had been learning Scala and applying it to our codebase. During that first conversation Michael and I discussed the Scala ecosystem and what kind of a book would best...
Machine Learning and Cognition in Enterprises: Business Intelligence Transformed
Machine Learning and Cognition in Enterprises: Business Intelligence Transformed

Learn about the emergence and evolution of IT in the enterprise, see how machine learning is transforming business intelligence, and discover various cognitive artificial intelligence solutions that complement and extend machine learning. In this book, author Rohit Kumar explores the challenges when these concepts...

Management Strategies for the Cloud Revolution
Management Strategies for the Cloud Revolution

Increase efficiency while saving money with “on-demand” computing

The biggest game-changing force in business since the creation of the Internet, cloud computing simplifies and lowers the cost of operations while providing flexibility and power you never dreamed possible. Make your strategic move now, with...

Computers Under Attack: Intruders, Worms and Viruses
Computers Under Attack: Intruders, Worms and Viruses

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The...

The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

Computer Organization and Design, Fifth Edition: The Hardware/Software Interface
Computer Organization and Design, Fifth Edition: The Hardware/Software Interface

The fifth edition of Computer Organization and Design-winner of a 2014 Textbook Excellence Award (Texty) from The Text and Academic Authors Association-moves forward into the post-PC era with new examples, exercises, and material highlighting the emergence of mobile computing and the cloud. This generational change is emphasized and...

Discrete Mathematics
Discrete Mathematics

Discrete mathematics is quickly becoming one of the most important areas of mathematical research, with applications to cryptography, linear programming, coding theory and the theory of computing. This book is aimed at undergraduate mathematics and computer science students interested in developing a feeling for what mathematics is all about,...

Computer Organization and Design, Fourth Edition: The Hardware/Software Interface
Computer Organization and Design, Fourth Edition: The Hardware/Software Interface

This Fourth Revised Edition of Computer Organization and Design includes a complete set of updated and new exercises, along with improvements and changes suggested by instructors and students. Focusing on the revolutionary change taking place in industry today--the switch from uniprocessor to multicore microprocessors--this classic...

Result Page: 24 23 22 21 20 19 18 17 16 15 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy