|
|
|
|
|
| | | | Network Infrastructure SecurityResearch on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... |
|
Uncertainty and Intelligent Information SystemsIntelligent systems are necessary to handle modern computer-based technologies managing information and knowledge. This book discusses the theories required to help provide solutions to difficult problems in the construction of intelligent systems. Particular attention is paid to situations in which the available information and data may be... | | Access Nets: Third International Conference on Access Networks, AccessNets 2008, Las Vegas, NV, USA, October 15-17, 2008. Revised PapersThis book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Access Networks, AccessNets 2008, held in Las Vegas, NV, USA, in October 2008.
The 30 revised full papers presented together with 5 invited papers were carefully reviewed and selected. The papers present original and... | | Computer Systems: A Programmer's Perspective (2nd Edition)
This book (CS:APP) is for computer scientists, computer engineers, and others
who want to be able to write better programs by learning what is going on “under
the hood” of a computer system.
Our aim is to explain the enduring concepts underlying all ... |
|
|
|
Result Page: 346 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 |