Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
The New Communications Technologies, Fifth Edition: Applications, Policy, and Impact
"Although the book is directed toward technology courses...it makes for interesting, thought-provoking reading." - Monitoring Times

As new communications applications are developed and brought to market, it is vital for communications professionals to keep abreast of these issues. Since the
...
Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)
Explorations in Computing: An Introduction to Computer Science (Chapman & Hall/CRC Textbooks in Computing)

Based on the author’s introductory course at the University of Oregon, Explorations in Computing: An Introduction to Computer Science focuses on the fundamental idea of computation and offers insight into how computation is used to solve a variety of interesting and important real-world problems. Taking an...

Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python
Python: Beginner's Guide to Artificial Intelligence: Build applications to intelligently interact with the world around you using Python

Develop real-world applications powered by the latest advances in intelligent systems

Key Features

  • Gain real-world contextualization using deep learning problems concerning research and application
  • Get to know the best practices to improve and optimize your machine...
Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
Pesticides: A Toxic Time Bomb in Our Midst
Pesticides: A Toxic Time Bomb in Our Midst
The writing of this book came about through a serendipitous circumstance. I wrote a book dealing with child labor in the United States, published three years earlier, containing a chapter that included a description of the hazards migrant farmworkers and their children face, not the least of which was exposure to pesticides. While mentioning the...
Digital Dice: Computational Solutions to Practical Probability Problems
Digital Dice: Computational Solutions to Practical Probability Problems

"Paul Nahin's Digital Dice is a marvelous book, one that is even better than his Duelling Idiots. Nahin presents twenty-one great probability problems, from George Gamow's famous elevator paradox (as corrected by Donald Knuth) to a bewildering puzzle involving two rolls of toilet paper, and he solves them all with the aid...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Play Redux: The Form of Computer Games (Digital Culture Books)
Play Redux: The Form of Computer Games (Digital Culture Books)
A new look at digital gaming and the aesthetics of play
 
Play is a very interesting thing. Somewhat strangely, though, play is not studied as often as are the consequences of play.
 
The reason for this becomes clear when we try to study play: it is a...
Basic Geotechnical Earthquake Engineering
Basic Geotechnical Earthquake Engineering

This title features subject matter that is organised logically to make it easy and interesting for the students. Emphasis has been given on the basics of geotechnical earthquake engineering. Home work problems have been given at the end of each chapter to test the understanding of concepts given in the chapter. At the end of appropriate...

java(TM).rmi: The Remote Method Invocation Guide
java(TM).rmi: The Remote Method Invocation Guide
Before the Java language was available, distributed systems engineering was greatly concerned with the problem of heterogeneity—the differences between CPUs, OSes, languages, and data formats. The challenge was to create architectureneutral formats and protocols which could be adapted to any architecture without burdening the programmer. RPC...
The Birth of Satan: Tracing the Devil's Biblical Roots
The Birth of Satan: Tracing the Devil's Biblical Roots
"An informative study of the biblical origins of Satan…With resourceful though never excessive citation, Mobley and Wray make a good job of pinning down the roots of a notoriously protean character."--The Times Literary Supplement

"Let's admit it. Even in a secular age we are all still
...
Doing Therapy with Children and Adolescents with Asperger Syndrome
Doing Therapy with Children and Adolescents with Asperger Syndrome

Iclinically met my fi rst children with Asperger’s and High-Functioning Autism in 1981 at Camp Wediko here in New England. Like many college students before us, my newlywed wife and I had driven north to New Hampshire to spend an intensive summer learning more about the careers we were about to enter: she, special education, and myself,...

unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy