Home | Amazing | Today | Tags | Publishers | Years | Search 
Networking Fundamentals: Wide, Local and Personal Area Communications
Networking Fundamentals: Wide, Local and Personal Area Communications

Information networking has emerged as a multidisciplinary diversified area of research over the past few decades. From traditional wired telephony to cellular voice telephony and from wired access to wireless access to the Internet, information networks have profoundly impacted our lifestyle. At the time of writing, over 3 billion...

Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)
Algebraic Specification of Communication Protocols (Cambridge Tracts in Theoretical Computer Science)

The specifications in this book are the result of a number of case studies performed by researchers from the Programming Research Group at the University of Amsterdam. The primary goal was to study the use of the techniques developed by the Programming Research Group for the specification of real-life protocols. From the pool of...

Taking Your iPad 2 to the Max
Taking Your iPad 2 to the Max

Oh, how far we’ve come.

As we progress into the second decade of the 21st century, it’s becoming increasingly obvious how the computers of the previous 30 years have begun to look not just old but archaic. The massive CRT monitors of the 1980s and 1990s have given way to pencil-thin displays of the 2000s. The...

From Gutenberg to Google: Electronic Representations of Literary Texts
From Gutenberg to Google: Electronic Representations of Literary Texts

Although this book focuses on the problems and potentials for electronic representations of the fundamental materials of document-based knowledge in literature, similar conditions obtain for representations of works in music, philosophy, history, the law, and religion. These fields find in paper documents the primary materials of...

CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone
CMS Security Handbook: The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

As a business owner, you are probably faced with hundreds of decisions that must be made weekly. Diving headlong into a technical effort might be scary. Diving into a security and operations effort is something you likely don't know how to do.

That's where this book comes in. This book helps you fill in the blanks for...

Handbook of Educational Data Mining (CRC Data Mining and Knowledge Discovery Series)
Handbook of Educational Data Mining (CRC Data Mining and Knowledge Discovery Series)

The goal of this book is to provide an overview of the current state of knowledge of educational data mining (EDM). The primary goal of EDM is to use large-scale educational data sets to better understand learning and to provide information about the learning process. Although researchers have been studying human learning for over a...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Elements of Data Compression
Elements of Data Compression

The data compression field has always been an important part of computer science, and it is becoming increasingly popular and important today. Although computers become faster and data storage becomes less expensive and more efficient, the in creased importance of sound and video necessitates the use of at least a small mea sure of...

Algorithms Sequential and Parallel: A Unified Approach
Algorithms Sequential and Parallel: A Unified Approach

A major thrust of computer science is the design, analysis, implementation, and scicntific evaluation of algorithms to solve critical problems. In addition, new challenges are being offered to computer scientists in the field of computational science and engineering, which includes challenging problems in computational biology,...

Random Polymer Models
Random Polymer Models

This work deals with a well-defined class of probabilistic models. The focus is on polymers. More precisely I should say that the focus is on the equilibrium statistical mechanics of a class of polymers: dynamical and non-equilibrium phenomena are not treated, reflecting the fact that these directions are at the moment...

Numerical Methods in Finance and Economics: A MATLAB-Based Introduction (Statistics in Practice)
Numerical Methods in Finance and Economics: A MATLAB-Based Introduction (Statistics in Practice)

A state-of-the-art introduction to the powerful mathematical and statistical tools used in the field of finance The use of mathematical models and numerical techniques is a practice employed by a growing number of applied mathematicians working on applications in finance. Reflecting this development, Numerical Methods in Finance and...

Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)
Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)

Excuse me, but who are you, exactly?

You are a father or mother, a son or daughter, husband or wife, a significant other, a rock climber, a kite-flyer, a bicycle enthusiast, a marathon runner, a collector of old movies, a secret novelist, a boxing fan. You are the center of your universe. On the picture collage from the...

Result Page: 274 273 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy