Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fundamental Mathematical Structures of Quantum Theory: Spectral Theory, Foundational Issues, Symmetries, Algebraic Formulation
Fundamental Mathematical Structures of Quantum Theory: Spectral Theory, Foundational Issues, Symmetries, Algebraic Formulation

This textbook presents in a concise and self-contained way the advanced fundamental mathematical structures in quantum theory. It is based on lectures prepared for a 6 months course for MSc students. The reader is introduced to the beautiful interconnection between logic, lattice theory, general probability theory, and general...

Stochastic Modeling and Analysis of Telecoms Networks
Stochastic Modeling and Analysis of Telecoms Networks

This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.
The authors propose a
...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

Firewall Policies and VPN Configurations
Firewall Policies and VPN Configurations
Deploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will...
Fuzzy Set and Its Extension: The Intuitionistic Fuzzy Set
Fuzzy Set and Its Extension: The Intuitionistic Fuzzy Set

Provides detailed mathematical exposition of the fundamentals of fuzzy set theory, including intuitionistic fuzzy sets

This book examines fuzzy and intuitionistic fuzzy mathematics and unifies the latest existing works in literature. It enables readers to fully understand the mathematics of both fuzzy set and...

Practical PHP 7, MySQL 8, and MariaDB Website Databases: A Simplified Approach to Developing Database-Driven Websites
Practical PHP 7, MySQL 8, and MariaDB Website Databases: A Simplified Approach to Developing Database-Driven Websites
Build interactive, database-driven websites with PHP 7, MySQL 8, and MariaDB. The focus of this book is on getting you up and running as quickly as possible with real-world applications. In the first two chapters, you will set up your development and testing environment, and then build your first PHP and MariaDB or...
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Agile Software Requirements: Lean Requirements Practices for Teams, Programs, and the Enterprise
Agile Software Requirements: Lean Requirements Practices for Teams, Programs, and the Enterprise

In the past decade, the movement to lighter-weight and increasingly agile methods has been the most significant change to affect the software enterprise since the advent of the waterfall model in the 1970s. Originated by a variety of thought and practice leaders and proven in real-world, successful experiments, the methods have proven...

Construction Quality and the Economy: A Study at the Firm Level (Management in the Built Environment)
Construction Quality and the Economy: A Study at the Firm Level (Management in the Built Environment)
This book discusses the relationship between construction quality and the state of the Singapore national economy, and describes how construction quality is affected as contracting firms strategically manage issues relating to profitability and survivability during economic boom and bust cycles. 

Adopting a
...
Map Construction Algorithms
Map Construction Algorithms

The book provides an overview of the state-of-the-art of map construction algorithms, which use tracking data in the form of trajectories to generate vector maps. The most common trajectory type is GPS-based trajectories. It introduces three emerging algorithmic categories, outlines their general algorithmic ideas, and discusses three...

Modelling and Reasoning with Vague Concepts
Modelling and Reasoning with Vague Concepts
Vagueness is central to the flexibility and robustness of natural language descriptions. Vague concepts are robust to the imprecision of our perceptions, while still allowing us to convey useful, and sometimes vital, information. The study of vagueness in Artificial Intelligence (AI) is therefore motivated by the desire to incorporate this...
Result Page: 41 40 39 38 37 36 35 34 33 32 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy