Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Robustness and Complex Data Structures
Robustness and Complex Data Structures
Our journey towards this Festschrift started when realizing that our teacher, mentor, and friend Ursula Gather was going to celebrate her 60th birthday soon. As a researcher, lecturer, scientific advisor, board member, reviewer, editor, Ursula has had a wide impact...
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
In Distributed Algorithms, Nancy Lynch provides a blueprint for designing, implementing, and analyzing distributed algorithms. She directs her book at a wide audience, including students, programmers, system designers, and researchers.

Distributed Algorithms
contains the most significant algorithms and impossibility
...
Production-Ready Microservices: Building Standardized Systems Across an Engineering Organization
Production-Ready Microservices: Building Standardized Systems Across an Engineering Organization
                 
One of the biggest challenges for organizations that have adopted microservice architecture is the lack of architectural, operational, and organizational standardization. After splitting a monolithic application or building a microservice ecosystem from scratch, many...
The Fantastic Inventions of Nikola Tesla (Lost Science)
The Fantastic Inventions of Nikola Tesla (Lost Science)
While a large portion of the European family has been surging westward during the last three or four hundred years, settling the vast continents of America, another, but smaller, portion has been doing frontier work in the Old World, protecting the rear by beating back the "unspeakable Turk" and reclaiming gradually the...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

English Grammar Workbook For Dummies
English Grammar Workbook For Dummies

Get some good grammar practice — and start speaking and writing well!

 

Good grammar is important, whether you want to advance your career, boost your GPA, or increase your SAT or ACT score. Practice is the key to improving your grammar skills, and that's what this workbook is all about. Open it and...

Object-Oriented and Classical Software Engineering
Object-Oriented and Classical Software Engineering

Almost every computer science and computer engineering curriculum now includes a required team-based software development project. In some cases, the project is only one semester or quarter in length, but a year-long team-based software development project is fast becoming the norm.

In an ideal world, every student would...

Alternative Breast Imaging: Four Model-Based Approaches (The International Series in Engineering and Computer Science)
Alternative Breast Imaging: Four Model-Based Approaches (The International Series in Engineering and Computer Science)

Medical imaging has been transformed over the past 30 years by the advent of computerized tomography (CT), magnetic resonance imaging (MRI), and various advances in x-ray and ultrasonic techniques. An enabling force behind this progress has been the (so far) exponentially increasing power of computers, which has made it practical to explore...

Result Page: 103 102 101 100 99 98 97 96 95 94 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy