Home | Amazing | Today | Tags | Publishers | Years | Search 
php/architect's Guide to Enterprise PHP Development
php/architect's Guide to Enterprise PHP Development

We live in a fast-paced world. Looking over the last decade, the world has changed so radically - politically, economically and culturally - that it’s difficult to believe only 10 years have passed. Technology is certainly no exception. It’s easy to overlook the huge changes in the way technology is used in our daily lives - because...

Open Source Software for Digital Forensics
Open Source Software for Digital Forensics

Open Source Applications
Springer Book Series
Editor: Ernesto Damiani, University of Milan, Italy
http://sesar.dti.unimi.it/ossbook/

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in...

Introduction to Texture Analysis: Macrotexture, Microtexture, and Orientation Mapping, Second Edition
Introduction to Texture Analysis: Macrotexture, Microtexture, and Orientation Mapping, Second Edition

The first edition of Introduction to Texture Analysis: Macrotexture, Microtexture, and Orientation Mapping broke new ground by collating seventy years worth of research in a convenient single-source format. Reflecting emerging methods and the evolution of the field, the second edition continues to provide comprehensive...

ESL Design and Verification: A Prescription for Electronic System Level Methodology
ESL Design and Verification: A Prescription for Electronic System Level Methodology

Visit the authors' companion site! http://www.electronicsystemlevel.com/ - Includes interactive forum with the authors!

Electronic System Level (ESL) design has mainstreamed - it is now an established approach at most of the world's leading system-on-chip (SoC) design companies and is being used increasingly in
...

Advances in Artificial Intelligence for Privacy Protection and Security
Advances in Artificial Intelligence for Privacy Protection and Security

In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas,...

Resource-Adaptive Cognitive Processes (Cognitive Technologies)
Resource-Adaptive Cognitive Processes (Cognitive Technologies)

This book investigates the adaptation of cognitive processes to limited resources. The central topics of this book are heuristics considered as results of the adaptation to resource limitations, through natural evolution in the case of humans, or through artificial construction in the case of computational systems; the construction and...

Greed, Lust and Gender: A History of Economic Ideas
Greed, Lust and Gender: A History of Economic Ideas

When does the pursuit of self-interest go too far, lapsing into morally unacceptable behaviour? Until the unprecedented events of the recent global financial crisis economists often seemed unconcerned with this question, even suggesting that "greed is good." A closer look, however, suggests that greed and lust are generally...

Coherent States in Quantum Physics
Coherent States in Quantum Physics

This self-contained introduction discusses the evolution of the notion of coherent states, from the early works of Schr?dinger to the most recent advances, including signal analysis. An integrated and modern approach to the utility of coherent states in many different branches of physics, it strikes a balance between mathematical and physical...

Polar Oceans from Space (Atmospheric and Oceanographic Sciences Library)
Polar Oceans from Space (Atmospheric and Oceanographic Sciences Library)

The book presents a wealth of material about the polar oceans, more specifically the ice-covered areas and peripheral seas. It provides a detailed history of the changing climate of the polar oceans as observed by satellite sensors in the last three decades. The satellite research data show spatial distributions of surface temperature, sea...

Outboard Engines: Maintenance, Troubleshooting, and Repair, Second Edition
Outboard Engines: Maintenance, Troubleshooting, and Repair, Second Edition

The first edition of Outboard Engines set the standard for a clear, easy-to-follow primer on engine basics, troubleshooting, care, and repair. This new edition, significantly expanded, brings the subject up to date, with full coverage of the new four-stroke engines, conventional electronic and direct fuel-injection systems, oil-mix...

The Myth of the Rational Market: A History of Risk, Reward, and Delusion on Wall Street
The Myth of the Rational Market: A History of Risk, Reward, and Delusion on Wall Street

Chronicling the rise and fall of the efficient market theory and the century-long making of the modern financial industry, Justin Fox's The Myth of the Rational Market is as much an intellectual whodunit as a cultural history of the perils and possibilities of risk. The book brings to life the people and ideas that forged modern finance...

The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Result Page: 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy