Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity Theft Handbook: Detection, Prevention, and Security
Identity Theft Handbook: Detection, Prevention, and Security
The magnitude of the identity theft and fraud problem is enormous. Identity fraud was identified as one of the top priorities of the Department of Justice, just prior to the terrorist attacks of 9/11. Naturally, everyone’s priorities changed after 9/11. The impact of identity theft and identity fraud is reaching a proportion and a level of...
ULSI Devices
ULSI Devices

A complete guide to current knowledge and future trends in ULSI devices Ultra-Large-Scale Integration (ULSI), the next generation of semiconductor devices, has become a hot topic of investigation. ULSI Devices provides electrical and electronic engineers, applied physicists, and anyone involved in IC design and process development with a...

How to Solve It: Modern Heuristics
How to Solve It: Modern Heuristics

This is not a book about algorithms . Certainly, it is full of algorithms , but that 's not what this book is about . This book is about possibilities . Its purpose is to present you not only with the prerequisite mandatory knowledge of the available problem-solving techniques , but more importantly to expand your ability to frame...

Professional Linux Kernel Architecture (Wrox Programmer to Programmer)
Professional Linux Kernel Architecture (Wrox Programmer to Programmer)
Find an introduction to the architecture, concepts and algorithms of the Linux kernel in Professional Linux Kernel Architecture, a guide to the kernel sources and large number of connections among subsystems. Find an introduction to the relevant structures and functions exported by the kernel to userland, understand the theoretical and...
Methodology for the Digital Calibration of Analog Circuits and Systems: with Case Studies
Methodology for the Digital Calibration of Analog Circuits and Systems: with Case Studies
Methodology for the Digital Calibration of Analog Circuits and Systems shows how to relax the extreme design constraints in analog circuits, allowing the realization of high-precision systems even with low-performance components. A complete methodology is proposed, and three applications are detailed. To start with, an in-depth...
The United States and Western Europe since 1945: From "Empire" by Invitation to Transatlantic Drift
The United States and Western Europe since 1945: From "Empire" by Invitation to Transatlantic Drift
`Offers a powerful argument, presents a sophisticated narrative, and is a magisterial, and, indeed, the best synthesis available of transatlantic relations since 1945 - a massive achievement.' Andreas W. Daum, Political Science Quarterly

Based on new and existing research by a world-class scholar, this is the first book in 20
...
Standard Handbook of Machine Design
Standard Handbook of Machine Design

The definitive machine design handbook for mechanical engineers, product designers, project engineers, design engineers, and manufacturing engineers covers every aspect of machine construction and operation. The 3rd edition of the Standard Handbook of Machine Design will be redesigned to meet the challenges of a new mechanical engineering...

HP Network Node Manager 9: Getting Started
HP Network Node Manager 9: Getting Started

This book guides you through the whole network monitoring implementation process. It covers all NNMi features and gives you hints to adapt this management software to your specific needs. It also describes how to use built-in features and adapt them in the most efficient way. It stitches the gap between technical personnel and management,...

Office 365: Migrating and Managing Your Business in the Cloud
Office 365: Migrating and Managing Your Business in the Cloud

Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical...

Transformer Design Principles: With Applications to Core-Form Power Transformers, Second Edition
Transformer Design Principles: With Applications to Core-Form Power Transformers, Second Edition

Updating and reorganizing the valuable information in the first edition to enhance logical development, Transformer Design Principles: With Applications to Core-Form Power Transformers, Second Edition remains focused on the basic physical concepts behind transformer design and operation. Starting with first principles, this book develops the...

Assessing and Improving Prediction and Classification: Theory and Algorithms in C++
Assessing and Improving Prediction and Classification: Theory and Algorithms in C++
Assess the quality of your prediction and classification models in ways that accurately reflect their real-world performance, and then improve this performance using state-of-the-art algorithms such as committee-based decision making, resampling the dataset, and boosting.  This book presents many important techniques for building...
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
unlimited object storage image
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy