 |
|
 CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One)All-in-One is All You Need
Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains... |  |  Principles of Data Mining (Undergraduate Topics in Computer Science)Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.
This book explains and explores the principal techniques of Data Mining: for classification, generation of association rules and clustering. It is written for readers without... |  |  Maple and Mathematica: A Problem Solving Approach for MathematicsThis book compares the two computer algebra programs, Maple and Mathematica used by students, mathematicians, scientists, and engineers.
Structured by presenting both systems in parallel, Mathematicas users can learn Maple quickly by finding the Maple equivalent to Mathematica functions, and vice versa.
This student reference handbook... |
|
|
 |  |  |  |  Graph Drawing: 15th International Symposium, GD 2007, Sydney, Australia, September 24-26, 2007, Revised Papers (Lecture Notes in Computer Science)This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Symposium on Graph Drawing, GD 2007, held in Sydney, Australia, September 24-26, 2007.
The 27 full papers and 9 short papers presented together with 2 invited talks, and a report on the graph drawing contest were carefully selected from 74... |
|
 Principles of Protocol DesignThis book introduces the reader to the principles used in a broad selection of modern data communication protocols and basic algorithms for use in distributed applications, including not only simple point-to-point data transfer protocols but also multi-party protocols and protocols for ensuring data security. The presentation uses CSP notation to... |  |  |  |  |
|
| Result Page: 738 737 736 735 734 733 732 731 730 729 728 727 726 725 724 723 722 721 720 |