Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Database Replication (Synthesis Lectures on Data Management)
Database Replication (Synthesis Lectures on Data Management)
Database replication is widely used for fault-tolerance, scalability and performance. The failure of one database replica does not stop the system from working as available replicas can take over the tasks of the failed replica. Scalability can be achieved by distributing the load across all replicas, and adding new replicas should the load...
Pattern Recognition in Speech and Language Processing (Electrical Engineering & Applied Signal Processing Series)
Pattern Recognition in Speech and Language Processing (Electrical Engineering & Applied Signal Processing Series)

Over the last 20 years, approaches to designing speech and language processing algorithms have moved from methods based on linguistics and speech science to data-driven pattern recognition techniques. These techniques have been the focus of intense, fast-moving research and have contributed to significant advances in this field.
...

Fundamentals of Electric Circuits
Fundamentals of Electric Circuits

You may be wondering why we chose a photo of astronauts working in space on the Space Station for the cover. We actually chose it for several reasons. Obviously, it is very exciting; in fact, space represents the most exciting frontier for the entire world! In addition, much of the station itself consists of all kinds of circuits! One...

Reconstructing Evolution: New Mathematical and Computational Advances
Reconstructing Evolution: New Mathematical and Computational Advances
Evolution is a complex process, acting at multiple scales, from DNA sequences and proteins to populations of species. Understanding and reconstructing evolution is of major importance in numerous subfields of biology. For example, phylogenetics and sequence evolution is central to comparative genomics, attempts to decipher genomes, and molecular...
Algorithms in Computational Molecular Biology: Techniques, Approaches and Applications
Algorithms in Computational Molecular Biology: Techniques, Approaches and Applications

This book represents the most comprehensive and up-to-date collection of information on the topic of computational molecular biology. Bringing the most recent research into the forefront of discussion, Algorithms in Computational Molecular Biology studies the most important and useful algorithms currently being used in the field, and...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)
Computational Methods for Three-Dimensional Microscopy Reconstruction (Applied and Numerical Harmonic Analysis)

Approaches to the recovery of three-dimensional information on a biological object, which are often formulated or implemented initially in an intuitive way, are concisely described here based on physical models of the object and the image-formation process. Both three-dimensional electron microscopy and X-ray tomography can be captured in the...

The All-New Switch Book: The Complete Guide to LAN Switching Technology
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The much-anticipated update to the bestselling book on LAN switching

Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...

Result Page: 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy