 |
|
 Handbook of Large-Scale Random Networks
With the advent of digital computers more than half a century ago, researchers working in a wide range of scientific disciplines have obtained an extremely powerful tool to pursue deep understanding of natural processes in physical, chemical, and biological systems. Computers pose a great challenge to mathematical sciences, as the range of... |  |  Enterprise Mac Security: Mac OS X Snow Leopard (Foundations)
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.
Enterprise Mac... |  |  Feynman Lectures On Gravitation (Frontiers in Physics)
During the 1962-63 academic year, Richard Feynman taught a course at Caltech on gravitation. Taking an untraditional approach to the subject, Feynman aimed the course at advanced graduate students and postdoctoral fellows who were familiar with the methods of relativistic quantum field theory-in particular, with Feynman-diagram perturbation... |
|
 Einstein, Physics and Reality
Albert Einstein was one of the principal founders of the quantum and relativity theories. Until 1925, when the Bose-Einstein statistics was discovered, he made great contributions to the foundations of quantum theory. However, after the discovery of quantum mechanics by Heisenberg and wave mechanics by Schrodinger, with the consequent... |  |  The Big Bang (Science Foundations)
Less than a hundred years ago, science seriously debated whether a cosmic array of stars and galaxies extended beyond the Milky Way. Discoveries and theories have revealed a universe of increasing enormity, complexity, and mystery. Beginning with an overview of the scientific method, "The Big Bang" follows the pioneering... |  |  Elements of Computer Security (Undergraduate Topics in Computer Science)
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.
... |
|
 Python 3 Object Oriented Programming
Object Oriented Programming is a very important aspect of modern programming languages. The basic principles of Object Oriented Programming are relatively easy to learn. Putting them together into working designs can be challenging.
This book makes programming more of a pleasure than a chore using powerful Python 3 object-oriented... |  |  Pro C# 2010 and the .NET 4 Platform, Fifth Edition
The first edition of this book was released at the 2001 Tech-Ed conference in Atlanta, Georgia. At that time, the .NET platform was still a beta product, and in many ways, so was this book. This is not to say that the early editions of this text did not have merit—after all, the book was a 2002 Jolt Award finalist and it won the 2003... |  |  Overlay Networks: Toward Information Networking.
A recent Cisco traffic forecast indicates that annual global IP traffic will reach two-thirds of a zettabyte by 2013. With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the... |
|
|
Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 |