|
|
|
|
Identity Theft Handbook: Detection, Prevention, and SecurityThe magnitude of the identity theft and fraud problem is enormous. Identity fraud was identified as one of the top priorities of the Department of Justice, just prior to the terrorist attacks of 9/11. Naturally, everyone’s priorities changed after 9/11. The impact of identity theft and identity fraud is reaching a proportion and a level of... | | ULSI Devices
A complete guide to current knowledge and future trends in ULSI devices Ultra-Large-Scale Integration (ULSI), the next generation of semiconductor devices, has become a hot topic of investigation. ULSI Devices provides electrical and electronic engineers, applied physicists, and anyone involved in IC design and process development with a... | | How to Solve It: Modern Heuristics
This is not a book about algorithms . Certainly, it is full of algorithms , but that 's
not what this book is about . This book is about possibilities . Its purpose is to
present you not only with the prerequisite mandatory knowledge of the available
problem-solving techniques , but more importantly to expand your ability to
frame... |
|
Professional Linux Kernel Architecture (Wrox Programmer to Programmer)Find an introduction to the architecture, concepts and algorithms of the Linux kernel in Professional Linux Kernel Architecture, a guide to the kernel sources and large number of connections among subsystems. Find an introduction to the relevant structures and functions exported by the kernel to userland, understand the theoretical and... | | | | |
|
|
|
|
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 |