|
|
|
|
Smart Computational Strategies: Theoretical and Practical Aspects
This book covers new developments and advances in the field of Computational Strategies for next-generation computing. The contributing authors share diverse perspectives on and extensive discussions of issues concerning the theory, applications, and future prospects. Addressing computing methodologies, hardware information systems ... | | MCSE Training Kit-Microsoft Windows XP ProfessionalOfficial Microsoft study guide for the skills you need on the job—and on the exam.
Learn how to set up and support the Windows® XP Professional operating system—and prepare for the Microsoft® Certified Professional (MCP) exam—with this official Microsoft study guide. Work at your own pace... | | Programming the Microsoft Windows Driver Model, Second EditionWriting a WDM driver is much like writing a kernel-mode driver for Windows NT 4.0. It's a bit easier because you don't have to detect and configure your own hardware. Ironically, it's simultaneously harder because correctly handling Plug and Play and power management is fiendishly difficult. If... |
|
|
Mathematical Models of Spoken LanguageHumans use language to convey meaningful messages to each other. Linguistic competence consists in the ability to express meaning reliably, not simply to obtain faithful lexical transcriptions. This invaluable reference tool is the product of many years' experience and research on language and speech technology. It presents the motivations for,... | | Windows Server 2003 Security CookbookIn the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know... | | Stealing the Network: How to Own an IdentityThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the... |
|
New Developments In Parsing Technology (Text, Speech and Language Techology)Parsing can be defined as the decomposition of complex structures into their constituent parts, and parsing technology as the methods, the tools and the software to parse automatically. Parsing is a central area of research in the automatic processing of human language. Parsers are being used in many application areas, for example question... | | | | Core Java(TM), Volume I--Fundamentals (8th Edition)In late 1995, the Java programming language buret onto the Internet scene and gained instant celebrity status. The promise of Java technology was that it would become the universal glue that connects users with information, whether that information comes from web servers, databases, information providers, or any other imaginable source. Indeed,... |
|
|
Result Page: 953 952 951 950 949 948 947 946 945 944 943 942 941 940 939 938 937 936 935 |