Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computational Methods for Modeling of Nonlinear Systems, Volume 79 (Mathematics in Science and Engineering)
Computational Methods for Modeling of Nonlinear Systems, Volume 79 (Mathematics in Science and Engineering)

In this book, we study theoretical and practical aspects of computing methods for mathematical modelling of nonlinear systems.

A number of computing techniques are considered, such as

methods of operator approximation with any given accuracy;

operator interpolation techniques including a non-Lagrange...

Email Security with Cisco IronPort (Networking Technology: Security)
Email Security with Cisco IronPort (Networking Technology: Security)

The Cisco IronPort Email Security Appliances (ESA) have been deployed in thousands of networks to accept, filter, and deliver email messages. The ESA is easy to deploy and its security-filtering settings are effective right out of the box. However, many organizations are looking for more from their messaging environment...

Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816) (3rd Edition)
Interconnecting Cisco Network Devices, Part 2 (ICND2), is a Cisco®-authorized, self-paced learning tool for CCNA® foundation learning. This book provides you with the knowledge needed to install, operate, and troubleshoot a small to medium-size branch office enterprise network, including configuring several switches and routers,...
Programming Pig
Programming Pig

This guide is an ideal learning tool and reference for Apache Pig, the open source engine for executing parallel data flows on Hadoop. With Pig, you can batch-process data without having to create a full-fledged application—making it easy for you to experiment with new datasets.

Programming Pig introduces...

The Book of CSS3: A Developer's Guide to the Future of Web Design
The Book of CSS3: A Developer's Guide to the Future of Web Design

CSS3 is the technology behind most of the eye-catching visuals on the Web. But the docs can be dry, murky, and full of dastardly caveats for inconsistent browser implementations.

This completely updated second edition of the best-selling Book of CSS3 distills the dense technical language of the CSS3 specification...

Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
iPhone SDK Application Development: Building Applications for the AppStore
iPhone SDK Application Development: Building Applications for the AppStore
This practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK...
Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice provides a detailed analysis of new imaging and pattern recognition techniques for the understanding and deployment of biometrics and forensic techniques as practical solutions to increase security. It contains a collection of the recent advances in the technology ranging from...
Fundamentals of Modern Electric Circuit Analysis and Filter Synthesis: A Transfer Function Approach
Fundamentals of Modern Electric Circuit Analysis and Filter Synthesis: A Transfer Function Approach
This textbook explains the fundamentals of electric circuits and uses the transfer function as a tool to analyze circuits, systems, and filters.  The author avoids the Fourier transform and three phase circuits, since these topics are often not taught in circuits courses.  General transfer functions for low pass, high pass, band pass...
Winning Results with Google AdWords, Second Edition
Winning Results with Google AdWords, Second Edition
Run a Profitable Google AdWords Campaign

Reach millions of targeted new customers at the precise moment theyAnd#39;re looking for the products and services youAnd#39;re selling with help from this hands-on guide. Winning Results with Google AdWords, Second Edition reveals the latest strategies for writing successful...

Hacking Digital Cameras (ExtremeTech)
Hacking Digital Cameras (ExtremeTech)
Why waste a thousand words?

Photos tell stories. And the more you can do with your digital camera, the better the story you can tell. So build a remote control and sneak up on that picture that keeps eluding you. Create an adapter that lets you use SLR-type lenses on your point-and-shoot. Play with lens magnification or create a pinhole...

Juniper MX Series
Juniper MX Series

Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection,...

unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy