Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

New Methods for Culturing Cells from Nervous Tissues: (Biovalley Monographs,)
New Methods for Culturing Cells from Nervous Tissues: (Biovalley Monographs,)

The last decades have seen the rise of neuroscience to one of the most dynamic biomedical disciplines. With the development of powerful new techniques it has been possible to investigate specific physiological and pathological neural mechanisms and thus to elucidate the etiology of many neurodegenerative and neuromuscular diseases.This first...

Network-aware Source Coding and Communication
Network-aware Source Coding and Communication

An introduction to the theory and techniques for achieving high quality network communication with the best possible bandwidth economy, this book focuses on network information flow with fidelity. Covering both lossless and lossy source reconstruction, it is illustrated throughout with real-world applications, including sensor networks and...

Building Probabilistic Graphical Models with Python
Building Probabilistic Graphical Models with Python

Solve machine learning problems using probabilistic graphical models implemented in Python with real-world applications

About This Book

  • Stretch the limits of machine learning by learning how graphical models provide an insight on particular problems, especially in high dimension areas such as image...
Storage Area Networks: Designing and Implementing a Mass Storage System
Storage Area Networks: Designing and Implementing a Mass Storage System

The complete guide to SAN technology for every implementer and manager!

Every month, enterprises require more information, delivered faster, with greater reliability—and traditional data storage methods no longer suffice. Enter the Storage Area Network (SAN), which can store enormous...

Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
THE DEFINITIVE GUIDE TO EPON
Written by one of the authors of the IEEE802.3ah standard, this is the first book to fully explain the EPON architecture, analyze its performance, and annotate the standard.

Clearly addressing efficiency, performance, and implementation issues, Ethernet Passive Optical Networks...

Integration of ICT in Smart Organizations
Integration of ICT in Smart Organizations
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
Agent-Based Hybrid Intelligent Systems
Agent-Based Hybrid Intelligent Systems
Many complex problems, such as financial investment planning, involve many different components or sub-tasks, each of which requires different types of processing. To solve such complex problems, a great diversity of intelligent techniques, including traditional hard computing techniques (e.g., expert systems) and soft computing techniques (e.g.,...
unlimited object storage image
Result Page: 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy