Home | Amazing | Today | Tags | Publishers | Years | Search 
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

A VLSI Architecture for Concurrent Data Structures (The Springer International Series in Engineering and Computer Science)
A VLSI Architecture for Concurrent Data Structures (The Springer International Series in Engineering and Computer Science)
Concurrent data structures simplify the development of concurrent programs by encapsulating commonly used mechanisms for synchronization and commu­ nication into data structures. This thesis develops a notation for describing concurrent data structures, presents examples of concurrent data structures, and describes an architecture to support...
Combinatorial Optimization: Theory and Algorithms (Algorithms and Combinatorics)
Combinatorial Optimization: Theory and Algorithms (Algorithms and Combinatorics)

This comprehensive textbook on combinatorial optimization places special emphasis on theoretical results and algorithms with provably good performance, in contrast to heuristics. It is based on numerous courses on combinatorial optimization and specialized topics, mostly at graduate level. This book reviews the...

Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management
Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management

Explaining how to apply to mathematical programming to network design and control, Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management fills the gap between mathematical programming theory and its implementation in communication networks. From the...

Functional Python Programming: Discover the power of functional programming, generator functions, lazy evaluation, the built-in itertools library, and monads, 2nd Edition
Functional Python Programming: Discover the power of functional programming, generator functions, lazy evaluation, the built-in itertools library, and monads, 2nd Edition

Create succinct and expressive implementations with functional programming in Python

Key Features

  • Learn how to choose between imperative and functional approaches based on expressiveness, clarity, and performance
  • Get familiar with complex concepts such as monads,...
The Fourth Secularisation: Autonomy of Individual Lifestyles (Routledge Focus on Religion)
The Fourth Secularisation: Autonomy of Individual Lifestyles (Routledge Focus on Religion)

This book examines recent forms of secularisation to demonstrate that we are now witnessing a “fourth secularisation”: the autonomy of lifestyles. After introducing two initial secularising movements, from mythos to Logos and from Logos to Christianity, the book sets out how from Max Weber...

Boxing and the Mob: The Notorious History of the Sweet Science
Boxing and the Mob: The Notorious History of the Sweet Science
More than any other sport, boxing has a history of being easy to rig. There are only two athletes and one or both may be induced to accept a bribe; if not the fighters, then the judges or referee might be swayed. In such inviting circumstances, the mob moved into boxing in the 1930s and profited by corrupting a sport ripe for...
  
   
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy