 |
|
 Cryptography and Network Security: Principles and Practice (5th Edition)
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections... |  |  Network Security Essentials: Applications and Standards (4th Edition)
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections... |  |  Seeing the Elephant: Understanding Globalization from Trunk to TailIn the new millennium, it is nearly impossible for us to talk about basic concerns like food or gas prices, without examining global intersections in trade, energy, immigration, the environment, and defense. Many countries once described as "developing" nations now wield greater economic and political influence than some of the... |
|
|
 Algorithms & Architectures (Neural Network Systems Techniques and Applications)Inspired by the structure of the human brain, artificial neural networks have been widely applied to fields such as pattern recognition, optimization, coding, control, etc., because of their ability to solve cumbersome or intractable problems by learning directly from data. An artificial neural network usually consists of a large number of simple... |  |  |  |  |
|
 IC Interconnect AnalysisAs integrated circuit (IC) feature sizes scaled below a quarter of a micron, thereby defining the deep submicron (DSM) era, there began a gradual shift in the impact on performance due to the metal interconnections among the active circuit components. Once viewed as merely parasitics in terms of their relevance to the overall circuit behavior,... |  |  Refactoring to AgilityAgile methodologies, such as XP, Scrum, Crystal, and Lean Software Development enable development organizations to deliver higher-quality software far more rapidly. However, for the "non-agile" development organization, transitioning to agility is an enormous leap, requiring radically new skills and presenting profound... |  |  Professional JMSProfessional JMS lifts the lid on the collection of data communications technologies known collectively as the Java Message Service (JMS). Don't approach this book without a very solid grounding in Java network programming and familiarity with the Java 2 Enterprise Edition (J2EE) environment, because the authors don't slow down for... |
|
| Result Page: 3 2 1 |