Home | Amazing | Today | Tags | Publishers | Years | Search 
The Princeton Companion to Mathematics
The Princeton Companion to Mathematics

This is a one-of-a-kind reference for anyone with a serious interest in mathematics. Edited by Timothy Gowers, a recipient of the Fields Medal, it presents nearly two hundred entries, written especially for this book by some of the world's leading mathematicians, that introduce basic mathematical tools and vocabulary; trace the...

Pediatric and Adolescent Musculoskeletal MRI: A Case-Based Approach
Pediatric and Adolescent Musculoskeletal MRI: A Case-Based Approach
MRI has transformed the field of pediatric and adolescent musculoskeletal imaging. When the more senior (and gray haired) of the two authors completed his pediatric radiology training, orthopedic radiology was a primarily plain film based discipline, occasionally supplemented by arthrography. Although much could be gleaned from...
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through...

2D Object Detection and Recognition: Models, Algorithms, and Networks
2D Object Detection and Recognition: Models, Algorithms, and Networks
This book is about detecting and recognizing 2D objects in gray-level images. Howare
models constructed? Howare they trained? What are the computational approaches to
efficient implementation on a computer? And finally, how can some of these computations
be implemented in the framework of parallel and biologically plausible neural...
Database Tuning: Principles, Experiments, and Troubleshooting Techniques
Database Tuning: Principles, Experiments, and Troubleshooting Techniques
Tuning your database for optimal performance means more than following a few short steps in a vendor-specific guide. For maximum improvement, you need a broad and deep knowledge of basic tuning principles, the ability to gather data in a systematic way, and the skill to make your system run faster. This is an art as well as a science, and...
Implementing Backup and Recovery: The Readiness Guide for the Enterprise
Implementing Backup and Recovery: The Readiness Guide for the Enterprise
Arm yourself with all the information you need to architect a backup and recovery system

System backup is essential in any enterprise–protecting data is equivalent to protecting the company or agency. Whether you have the task of putting together a backup and recovery system for your organization or you are thinking about how backup and...

Using Samba, Second Edition
Using Samba, Second Edition
Using Samba, Second Edition is a comprehensive guide to Samba administration. This new edition covers all versions of Samba from 2.0 to 2.2, including selected features from an alpha version of 3.0, as well as the SWAT graphical configuration tool. Updated for Windows 2000, ME, and XP, the book also explores...
A VLSI Architecture for Concurrent Data Structures (The Springer International Series in Engineering and Computer Science)
A VLSI Architecture for Concurrent Data Structures (The Springer International Series in Engineering and Computer Science)
Concurrent data structures simplify the development of concurrent programs by encapsulating commonly used mechanisms for synchronization and commu­ nication into data structures. This thesis develops a notation for describing concurrent data structures, presents examples of concurrent data structures, and describes an architecture to support...
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion...

Decision Support: An Examination of the DSS Discipline (Annals of Information Systems)
Decision Support: An Examination of the DSS Discipline (Annals of Information Systems)

The origin of this volume came while planning the 2009 International Conference on Decision Support Systems. The theme of that 2-day conference was “Assessing Today and Envisioning Tomorrow.” We wanted to summarize where the field had been and generate ideas regarding where it was going. The meeting brought together...

Gray's Anatomy for Students
Gray's Anatomy for Students

This completely new addition to the Gray's Anatomy family is specifically tailored to meet the needs of today's anatomy students. A team of authors with a wealth of diverse teaching and clinical experience have carefully crafted the book to efficiently cover the information taught in contemporary anatomy courses. A user-friendly...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy