Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pascal Plus Data Structures, Algorithms, and Advanced Programming
Pascal Plus Data Structures, Algorithms, and Advanced Programming
Until recently there has not been much consensus among educators on what formal education is necessary for a computer professional. It has always been considered essential to have a great deal of mathematical knowledge, as \vell as an understanding of computer hardware. Software education, however, often consisted of the teaching...
Modeling Software with Finite State Machines: A Practical Approach
Modeling Software with Finite State Machines: A Practical Approach
This book discusses a topic that is among the central questions of software development. Therefore, we must position ourselves in that area to justify our right to express our opinion on that topic. Saying “we” implies at least one person in the co-author group. We have worked for several years in software development using various...
Bandwidth Efficient Coding (IEEE Series on Digital & Mobile Communication)
Bandwidth Efficient Coding (IEEE Series on Digital & Mobile Communication)

This book addresses coding, a new solution to the major challenge of communicating more bits of information in the same radio spectrum.

  • Explores concepts and new transmission methods that have arisen in the last 15 years
  • Discusses the method of faster than Nyquist signaling
  • ...
Antenna Design for Mobile Devices (Wiley - IEEE)
Antenna Design for Mobile Devices (Wiley - IEEE)

Expanded and updated, this practical guide is a one-stop design reference containing all an engineer needs when designing antennas

  • Integrates state-of-the-art technologies with a special section for step-by-step antenna design
  • Features up-to-date bio-safety and electromagnetic compatibility regulation...
DNS Security Management (IEEE Press Series on Networks and Service Management)
DNS Security Management (IEEE Press Series on Networks and Service Management)

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies  

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...

Knowledge-Based Neurocomputing
Knowledge-Based Neurocomputing
Neurocomputing methods are loosely based on a model of the brain as a network of simple interconnected processing elements corresponding to neurons. These methods derive their power from the collective processing of artificial neurons, the chief advantage being that such systems can learn and adapt to a changing environment. In knowledge-based...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
New automated, application-independent methodology for designing and deploying sensor networks

Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications without much knowledge of the low-level networking aspects of deployment. This new approach is based...

Ruby Developer's Guide
Ruby Developer's Guide
"Ruby Developer's Guide" discusses the role of Ruby in real-world applications, including the use of databases and XML, the coding of graphical user interfaces (GUIs) by means of different toolkits, communicating with other languages over SOAP/XML-RPC or sockets, and the programming of concurrent and distributed applications. Using...
DSP Software Development Techniques for Embedded and Real-Time Systems (Embedded Technology)
DSP Software Development Techniques for Embedded and Real-Time Systems (Embedded Technology)
Today's embedded and real-time systems contain a mix of processor types: off-the-shelf microcontrollers, digital signal processors (DSPs), and custom processors. The decreasing cost of DSPs has made these sophisticated chips very attractive for a number of embedded and real-time applications, including automotive, telecommunications, medical...
Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
Result Page: 43 42 41 40 39 38 37 36 35 34 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy