Home | Amazing | Today | Tags | Publishers | Years | Search 
Enterprise Cloud Computing: Technology, Architecture, Applications
Enterprise Cloud Computing: Technology, Architecture, Applications

In today’s world virtually all available information on any technical topic is just a few clicks away on the web. This is especially true of an emerging area such as cloud computing. So why write a book, and, who should read this book and why?

Every few years a new ‘buzzword’ becomes the rage of the...

Adobe Acrobat X for Windows and Macintosh: Visual QuickStart Guide
Adobe Acrobat X for Windows and Macintosh: Visual QuickStart Guide

You have to give Adobe credit. There aren’t many companies that have managed to change the world once, let alone twice. In 1985, Adobe introduced PostScript, which became the rock on which the entire electronic publishing industry was built; they forever changed the world of professional printing. In 1994, Adobe launched...

Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems

It is a great pleasure for me to write this foreword about a book that comes out of one of the first research projects funded by ANR, the French National Research Agency. ANR was established by the French government in 2005 to fund research projects, based on competitive schemes giving researchers the best opportunities to realize...

Fundamentals in Information Theory and Coding
Fundamentals in Information Theory and Coding

This book represents my 30 years continuing education courses for graduate and master degree students at the Electronics and Telecommunications Faculty from the Technical University of Cluj Napoca, Romania and partially my research activity too. The presented topics are useful for engineers, M.Sc. and PhD students who need basics in...

Scalable Network Monitoring in High Speed Networks
Scalable Network Monitoring in High Speed Networks

Network monitoring serves as basis for a wide scope of network operations, engineering and management. Precise network monitoring involves inspecting every packet traversing in a network. However, this is infeasible in today’s and future high-speed networks, due to significant overheads of processing, storing, and transferring...

R for SAS and SPSS Users (Statistics and Computing)
R for SAS and SPSS Users (Statistics and Computing)

While SAS and SPSS have many things in common, R is very different. My goal in writing this book is to help you translate what you know about SAS or SPSS into a working knowledge of R as quickly and easily as possible. I point out how they differ using terminology with which you are familiar, and show you which add-on packages will...

Introduction to Embedded Systems: Interfacing to the Freescale 9S12
Introduction to Embedded Systems: Interfacing to the Freescale 9S12

Embedded computer systems are electronic systems that include a microcomputer to perform specific dedicated tasks. The computer is hidden inside these products. Embedded systems are ubiquitous. Every week millions of tiny computer chips come pouring out of factories like Freescale, Microchip, Philips, Texas Instruments, Silicon Labs,...

Challenges in Natural Language Processing (Studies in Natural Language Processing)
Challenges in Natural Language Processing (Studies in Natural Language Processing)

Throughout most of the 1960s, 1970s, and 1980s, computational linguistics enjoyed an excellent reputation. A sense of the promise of the work to society was prevalent, and high expectations were justified by solid, steady progress in research.

Nevertheless, by the close of the 1980s, many people openly expressed doubt about...

Fundamentals of Sensor Network Programming: Applications and Technology
Fundamentals of Sensor Network Programming: Applications and Technology

Sensor processing is a central and an important problem in aerospace/defense, automation, medical imaging, and robotics, to name only a few areas. A surveillance system used in aerospace and defense is an example of a sensor processing system. It uses devices such as infrared sensors, microwave radars, and laser radars that are...

Numerical Methods in Finance and Economics: A MATLAB-Based Introduction (Statistics in Practice)
Numerical Methods in Finance and Economics: A MATLAB-Based Introduction (Statistics in Practice)

A state-of-the-art introduction to the powerful mathematical and statistical tools used in the field of finance The use of mathematical models and numerical techniques is a practice employed by a growing number of applied mathematicians working on applications in finance. Reflecting this development, Numerical Methods in Finance and...

The Soft Science of Road Racing Motorcycles
The Soft Science of Road Racing Motorcycles
If your intention is to improve, not just pick up some "tricks," you should understand exactly what is going on with the most mportant part of the riding package, the rider. After all. whether your bike works well or not is measured in ten/thousandths of inches and millimeters, that's how far machine technology has...
Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy