Home | Amazing | Today | Tags | Publishers | Years | Search 
Java How to Program (early objects) (9th Edition) (Deitel)
Java How to Program (early objects) (9th Edition) (Deitel)

Welcome to Java and Java How to Program, Ninth Edition! This book presents leadingedge computing technologies for students, instructors and software developers.

The new Chapter 1 engages students with intriguing facts and figures to get them excited about studying computers and programming. The chapter includes a table of some of...

Principles of Computer Organization and Assembly Language
Principles of Computer Organization and Assembly Language

This is a book on the organization and architecture of theJava Virtual Machine(JVM), the software at the heart of the Java language and is found inside most computers,Web browsers, PDAs, and networked accessories. It also covers general principles of machine organization and architecture, with llustrations from other popular (and...

Wireless Communications (Wiley - IEEE)
Wireless Communications (Wiley - IEEE)

"Professor Andreas F. Molisch, renowned researcher and educator, has put together the comprehensive book, Wireless Communications. The second edition, which includes a wealth of new material on important topics, ensures the role of the text as the key resource for every student, researcher, and practitioner in the...

Data Structures and Problem Solving Using Java (3rd Edition)
Data Structures and Problem Solving Using Java (3rd Edition)

T^his book is designed for a two-semester sequence in computer science, beginning with what is typically known as Data Structures and continuing with advanced data structures and algorithm analysis. It is appropriate for the courses from both the two-course and three-course sequences in "B.l...

Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)
Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)

The present work grew out of lecture notes I prepared for a Vh hour tutorial that I was invited to give at the 29th IEEE Computer Conference (CompCon) in San Francisco on February 27, 1987. I have just completed a substantial update of the material, including the addition of several topics. My main purpose is to provide a...

Mathematical Structures for Computer Science: A Modern Treatment of Discrete Mathematics
Mathematical Structures for Computer Science: A Modern Treatment of Discrete Mathematics

The important role that discrete structures plays in computer science is gaining recognition. Computing Curricula 2001 (CC2001), the latest curriculum recommendation for computer- related education, was a joint undertaking of the Institute for Electrical and Electronic Engineers/Computer Society (IEEE/CS) and the Association for...

Engineering Secure Software and Systems: Third International Symposium
Engineering Secure Software and Systems: Third International Symposium

It is our pleasure to welcome you to the third edition of the International Symposium on Engineering Secure Software and Systems.

This unique event aims at bringing together researchers from software engineering and security engineering, which might help to unite and further develop the two communities in this and future...

Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing
Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing

This book and its companion volume, LNCS vols. 6145 and 6146, constitute the proceedings of the International Conference on Swarm Intelligence (ICSI 2010) held in Beijing, the capital of China, during June 12-15, 2010. ICSI 2010 was the first gathering in the world for researchers working on all aspects of swarm intelligence, and...

Digital Filters: Principles and Applications with MATLAB (IEEE Series on Digital & Mobile Communication)
Digital Filters: Principles and Applications with MATLAB (IEEE Series on Digital & Mobile Communication)
The history of digital filters essentially began in the mid - 1970s, concurrent with the advent of the fi eld of study called digital signal processing (DSP). Over the ensuing 30 something years, digital filters have become both a facilitating and enabling technology. They serve as analog replacements as well as serving in unique...
SystemVerilog for Verification: A Guide to Learning the Testbench Language Features
SystemVerilog for Verification: A Guide to Learning the Testbench Language Features
This book should be the fi rst one you read to learn the SystemVerilog verifi cation language constructs. It describes how the language works and includes many examples on how to build a basic coverage-driven, constrained-random, layered testbench using Object-Oriented Programming (OOP). The book has many guidelines on building...
CCIE Wireless Exam (350-050) Quick Reference
CCIE Wireless Exam (350-050) Quick Reference

With the introduction of wireless LAN (WLAN), IP networks are now also available for those applications on which wired technologies are not suitable or no wired connectivity is available at all. The following are a few wireless use cases:

  • Home ISP connectivity: Consumer products
  • Building-to-building...
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy