Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Algorithm Design Manual
The Algorithm Design Manual
This expanded and updated second edition of a classic bestseller continues to take the "mystery" out of designing and analyzing algorithms and their efficacy and efficiency. Expanding on the highly successful formula of the first edition, the book now serves as the primary textbook of choice for any algorithm design course while...
Wireless Information Networks (Wiley Series in Telecommunications and Signal Processing)
Wireless Information Networks (Wiley Series in Telecommunications and Signal Processing)
Towards location aware mobile ad hoc sensors

A Systems Engineering Approach to Wireless Information Networks

The Second Edition of this internationally respected textbook brings readers fully up to date with the myriad of developments in wireless communications. When first published in 1995, wireless communications was synonymous...

Bioinformatics Technologies
Bioinformatics Technologies
Solving modern biological problems requires advanced computational methods. Bioinformatics evolved from the active interaction of two fast-developing disciplines, biology and information technology. The central issue of this emerging field is the transformation of often distributed and unstructured biological data into meaningful information....
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i

"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC

"This...

Fundamentals of Database Systems (3rd Edition)
Fundamentals of Database Systems (3rd Edition)
Fundamentals of Database Systems combines clear explanations of theory and design, broad coverage of models and real systems, and excellent examples with up-to-date introductions to modern database technologies. This edition is completely revised and updated, and reflects the latest trends in technological and application development....
Web Site Privacy with P3P
Web Site Privacy with P3P
Introducing the long-awaited first step to personal privacy on the Web!

Privacy on the Internet is a very complicated–and delicate–subject. It is about making sure that sites are honest with the people using their services, and providing the end user with the choice of whether or not to share information with the original server....

Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Genomics and Proteomics Engineering in Medicine and Biology (IEEE Press Series on Biomedical Engineering)
Genomics and Proteomics Engineering in Medicine and Biology (IEEE Press Series on Biomedical Engineering)

Current applications and recent advances in genomics and proteomics

Genomics and Proteomics Engineering in Medicine and Biology presents a well-rounded, interdisciplinary discussion of a topic that is at the cutting edge of both molecular biology and bioengineering. Compiling contributions by established experts, this...

The Ruby Way
The Ruby Way

The Ruby Way assumes that the reader is already familiar with the subject matter. Using many code samples it focuses on "how-to use Ruby" for specific applications, either as a stand-alone language, or in conjunction with other languages.

Topics covered include:

* Simple data tasks;
* Manipulating structured
...

Linux Cluster Architecture (Kaleidoscope)
Linux Cluster Architecture (Kaleidoscope)
Cluster computers provide a low-cost alternative to multiprocessor systems for many applications. Building a cluster computer is within the reach of any computer user with solid C programming skills and a knowledge of operating systems, hardware, and networking. This book leads you through the design and assembly of such a system, and shows you how...
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."

...

Computing for Numerical Methods Using Visual C++
Computing for Numerical Methods Using Visual C++
A visual, interdisciplinary approach to solving problems in numerical methods

Computing for Numerical Methods Using Visual C++ fills the need for a complete, authoritative book on the visual solutions to problems in numerical methods using C++. In an age of boundless research, there is a need for a programming language that can successfully...

Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy