Home | Amazing | Today | Tags | Publishers | Years | Search 
Analysis for Computer Scientists: Foundations, Methods, and Algorithms (Undergraduate Topics in Computer Science)
Analysis for Computer Scientists: Foundations, Methods, and Algorithms (Undergraduate Topics in Computer Science)

Mathematics and mathematical modelling are of central importance in computer science. For this reason the teaching concepts of mathematics in computer science have to be constantly reconsidered, and the choice of material and the motivation have to be adapted. This applies in particular to mathematical analysis, whose significance has to be...

Information Security Architecture: An Integrated Approach to Security in the Organization
Information Security Architecture: An Integrated Approach to Security in the Organization

This book is dedicated to my husband, Todd A. Tudor, and my three children, Drew, Allyssa, and Chad, who spent many hours patiently waiting for my time and attention while this book was being written.

Profits from this book will be contributed to the children of the world through the YMCA in Ethiopia, Africa, and through The...

Microsoft Expression Web 3: Complete (Shelly Cashman)
Microsoft Expression Web 3: Complete (Shelly Cashman)

Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud of the fact that our textbooks have been the most widely used books in education. Microsoft® Expression® Web 3: Complete continues with the innovation, quality, and reliability that you have come to expect from the Shelly Cashman...

How to Solve It: Modern Heuristics
How to Solve It: Modern Heuristics

This is not a book about algorithms . Certainly, it is full of algorithms , but that 's not what this book is about . This book is about possibilities . Its purpose is to present you not only with the prerequisite mandatory knowledge of the available problem-solving techniques , but more importantly to expand your ability to frame...

From Bash to Z Shell: Conquering the Command Line
From Bash to Z Shell: Conquering the Command Line

A shell is a sophisticated way to control your computer—Unix, Linux, Microsoft Windows, Mac OS X, and others. If you do more than the most basic operations, you can do many of them more powerfully and quickly with a shell and your keyboard than by using a mouse.

The history of shells goes back some 30 years. In the early...

Agent-Based Service-Oriented Computing (Advanced Information and Knowledge Processing)
Agent-Based Service-Oriented Computing (Advanced Information and Knowledge Processing)

Service-Oriented Computing (SOC) allows software development time to be shortened by the composition of existing services across the Internet. Further exploitation of this revolutionary trend is feasible through automation, thanks to the use of software agents and techniques from distributed artificial intelligence. This book provides an...

Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification
Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification

The world of enterprise routing with Juniper Networks devices is getting very exciting—new technologies, products, and network developments are making the enterprise network environment one of the most dynamic places to be. However, we, the authors, hope to focus that energy by providing you with a detailed and practical...

Elastic Beanstalk
Elastic Beanstalk

Thank you for picking up a copy of this book. Amazon Elastic Beanstalk is one of Amazon AWS’s services. It offers a platform for easy deployment of web applications. The first version of Elastic Beanstalk handles Java applications running in a Tomcat container. Deploying an application has been made as easy as uploading your WAR...

Android Apps for Absolute Beginners
Android Apps for Absolute Beginners

Over the last two years, Google’s Android operating system (OS) has gone from a virtually unknown open source solution to the current mobile OS market leader among all mobile handsets, with over one-third of the market share, and it’s still climbing rapidly. Android has even started to dominate the tablet OS marketplace, and...

Deploying Microsoft Forefront Unified Access Gateway 2010
The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)
The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)

In the current fast-paced and constantly changing business environment, it is more important than ever for organizations to be agile, monitor business performance, and meet with increasingly stringent compliance requirements. Written by pioneering consultants and bestselling authors with track records of international success, The...

UMTS Network Planning, Optimization, and Inter-Operation with GSM
UMTS Network Planning, Optimization, and Inter-Operation with GSM

The continuing explosive growth in mobile communication is demanding more spectrally efficient radio access technologies than the prevalent second generation (2G) systems such as GSM to handle just the voice traffic. We are already witnessing high levels of mobile penetration exceeding 70% in some countries. It is anticipated that by...

Result Page: 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy