 |
|
 |  |  Emerging Free and Open Source Software PracticesProject infrastructure and software repositories are now widely available at low cost with easy extraction, providing a foundational base to conduct detailed cyber-archeology at a scale not open to researchers before. Emerging Free and Open Source Software Practices provides a collection of empirical research acting as a focal point to the status... |  |  |
|
 Swarm Intelligence: Introduction and Applications (Natural Computing Series)The laws that govern the collective behavior of social insects, flocks of birds, or fish schools continue to mesmerize researchers. While individuals are rather unsophisticated, in cooperation they can solve complex tasks, a prime example being the ability of ant colonies to find shortest paths between their nests and food sources. Task-solving... |  |  |  |  Prolog Programming for Artificial IntelligenceThis best-selling guide to Prolog has been fully revised and extended to provide an even greater range of applications, enhancing its value as a stand-alone guide to Prolog, artificial intelligence, or AI programming. Ivan Bratko discusses natural language processing with grammar rules, planning, and machine learning. The coverage of... |
|
 The Complete Idiot's Guide to Managing Your MoneyThe Complete Idiot's Guide to Managing Your Money shows that any numbskull can master personal finance. In this second edition, a father-and-daughter writing team, Robert K. Heady and Christy Heady, give readers the best advice culled from their many years of experience in consumer rights and money management. The Headys believe that... |  |  iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious... |  |  |
|
 Power Systems Electromagnetic Transients Simulation (IEE Power & Energy Series, 39)Accurate knowledge of electromagnetic power system transients is crucial to the operation of an economic, efficient and environmentally friendly power systems network without compromising on the reliability and quality of Electrical Power Supply. Electromagnetic transients simulation (EMTS) has become a universal tool for the analysis of power... |  |  P2P Networking and Applications (Morgan Kaufmann Series in Networking)Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a... |  |  TCP/IP Architecture, Design and Implementation in Linux (Practitioners)This book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation. Starting with simple client-server socket programs and progressing to complex design and implementation of TCP/IP protocol in linux, this book provides different aspects of socket... |
|
| Result Page: 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 |