Home | Amazing | Today | Tags | Publishers | Years | Search 
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
The latest edition of this classic is updated with new problem sets and material

The Second Edition of this fundamental textbook maintains the book's tradition of clear, thought-provoking instruction. Readers are provided once again with an instructive mix of mathematics, physics, statistics, and information theory.

All the...

Roxio Easy Media Creator For Dummies
Roxio Easy Media Creator For Dummies
Your guide to Roxio’s fully integrated digital media toolbox

Capture video, pictures, and sound, edit photos, store data files, and burn CDs or DVDs

What do you want to do with CDs and DVDs? Share home movies? Create a music library? Preserve your business records? Roxio’s Easy Media Creator can do it all and with this...

Beginning Algorithms (Wrox Beginning Guides)
Beginning Algorithms (Wrox Beginning Guides)
Beginning Algorithms

A good understanding of algorithms, and the knowledge of when to apply them, is crucial to producing software that not only works correctly, but also performs efficiently. This is the only book to impart all this essential information—from the basics of algorithms, data structures, and performance characteristics to...

J2EE Open Source Toolkit : Building an Enterprise Platform with Open Source Tools (Java Open Source Library)
J2EE Open Source Toolkit : Building an Enterprise Platform with Open Source Tools (Java Open Source Library)
Discover how to harness the full power of open source tools to build a free J2EE enterprise platform

The choice is yours . . . you can spend thousands of dollars on commercial enterprise platforms or you can take advantage of free, fast, and reliable open source alternatives. To make your decision even easier, this innovative book provides you...

Face It: Recognizing and Conquering the Hidden Fear That Drives All Conflict at Work
Face It: Recognizing and Conquering the Hidden Fear That Drives All Conflict at Work

Worrier. Controller. Attention-seeker. Prisoner. Victim. Fake.

Do you work with people who fit those descriptions? Does one of those names describe you?

Many different types of fear can keep talented professionals from achieving professional success. Worse, fear is the root of conflict, which can undermine the productivity...

Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
Information Technology Outsourcing Transactions: Process, Strategies, and Contracts
An organized, methodical, real-world approach to the complex process of information technology outsourcing.

McDonnell Douglas, Delta, Lufthansa, Hughes Electronics, Hertz, Chase Manhattan, Herman's Sporting Goods, John Wiley & Sons, Proctor & Gamble ... these are just a few of the hundreds of companies that have...

Vector Games Math Processors (Wordware Game Math Library)
Vector Games Math Processors (Wordware Game Math Library)
Vector math processors have, up until recently, been in the domain of
the supercomputer, such as the Cray computers. Computers that have
recently joined this realm are the Apple Velocity Engine (AltiVec)
coprocessor of the PowerPC G4 in Macintosh and UNIX computers, as
well as IBM’s Power PC-based Gekko used in the
...
UPC: Distributed Shared-Memory Programming
UPC: Distributed Shared-Memory Programming
A must-have for UPC programmers and applications developers

This publication provides an in-depth interpretation of UPC language specifications for use in highly parallel systems. With its extensive use of examples, UPC programming case studies, and illustrations, it offers new insights into developing efficient and effective UPC applications...

Foundations of Java for ABAP Programmers
Foundations of Java for ABAP Programmers
Java has been a part of developers’ vocabularies since 1995. At first it was thought of as
being a nice, neat little language that could do some amazing things for the Internet. However,
the language soon matured, and it still kept its simple approach. Developers started to realize
the awesome power of a clean uncluttered
...
Free/Open Source Software Development
Free/Open Source Software Development
In the last few years, free and open source software has gathered increasing
interest, both from the business and the academic worlds. As some projects in different
application domains, like Linux together with the suite of GNU utilities,
GNOME, KDE, Apache, sendmail, bind, and several programming languages, have
achieved huge
...
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy