Home | Amazing | Today | Tags | Publishers | Years | Search 
The Mathematics of Coding Theory
The Mathematics of Coding Theory

This book is intended to be accessible to undergraduate students with two years of typical mathematics experience, most likely meaning calculus with a little linear algebra and differential equations. Thus, specifically, there is no assumption oLa background inabstr&;t algebra or number theory, nor of probability, nor of linear...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the...

The Complete Idiot's Guide to Google Chrome and Chrome OS
The Complete Idiot's Guide to Google Chrome and Chrome OS

You may know When Dinosaurs Ruled the Earth as a goofy humans-coexisting-withdinosaurs movie from the 1970s. However, in technology circles, “When Dinosaurs Ruled the Earth” refers to a grim humans-coexisting-with-mainframes story from the 1970s. I refer, of course, to IBM and its brontosaurus-size computers (called...

Modelling Enterprise Architectures (Iet Professional Applications of Computing Series)
Modelling Enterprise Architectures (Iet Professional Applications of Computing Series)

The world of business and commerce is changing. As technology advances at a rate of knots and the geography of global working becomes less and less relevant, so the need to run an effective business becomes more and more important. Businesses grow at an alarming rate, often overnight. Interest in particular field can explode resulting...

Quality Management for IT Services: Perspectives on Business and Process Performance
Quality Management for IT Services: Perspectives on Business and Process Performance

In the field of IT, the markets, business activities, needs and requirements of internal and external service providers and customers are changing in ever-shortening cycles. This forces companies to increase their organizational flexibility not only as far as their structure is concerned but also with regard to established business...

Foundations of XML Processing: The Tree-Automata Approach
Foundations of XML Processing: The Tree-Automata Approach

Computer science, like other mathematical fields, cannot live without a tight relationship with reality. However, such a relationship is, frankly, not very common. This is probably why people so enthusiastically welcome a true meeting of theory and practice. In that sense, the coming together of XML and tree automata theory was a...

Vector Basic Training: A Systematic Creative Process for Building Precision Vector Artwork
Vector Basic Training: A Systematic Creative Process for Building Precision Vector Artwork

The one question I get asked most by other creatives is, “How do you get your vector artwork to look so nice?” When people ask me this, they’re not talking about any specific art project or illustration, but rather how I go about building my artwork in vector format so precisely.

Truth is that many...

Computers, Phones, and the Internet: Domesticating Information Technology
Computers, Phones, and the Internet: Domesticating Information Technology

During the past decade, technology has become more pervasive, encroaching more and more on our lives. Computers, cell phones, and the internet have an enormous influence not only on how we function at work, but also on how we communicate and interact outside the office. Researchers have been documenting the effect that these types of...

Microsoft Office 2007 Fundamentals: Projects Binder
Microsoft Office 2007 Fundamentals: Projects Binder

Welcome to the Microsoft Office 2007 Fundamentals Projects Binder! The projects in this binder cover the primary features and commands of Office 2007 and provide valuable opportunities to apply or extend skills learned in an accompanying textbook. The 150 projects in this binder can be used with any Microsoft® Office 2007 textbook to...

Adobe Photoshop CS5 for Photographers: A professional image editor's guide to the creative use of Photoshop for the Macintosh and PC
Adobe Photoshop CS5 for Photographers: A professional image editor's guide to the creative use of Photoshop for the Macintosh and PC

When I fi rst started using Photoshop, it was a much simpler program to get to grips with compared with what we see today. Since then Adobe Photoshop CS5 has evolved to supply photographers with all the tools they need. My aim is to provide you with a working photographer’s perspective of what Photoshop CS5 can do and how to...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204 (CWNP Official Study Guides)
CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204 (CWNP Official Study Guides)

If you have purchased this book or if you are even thinking about purchasing this book, you probably have some interest in taking the CWSP ® (Certifi ed Wireless Security Professional) certifi cation exam or in learning what the CWSP certifi cation exam is about. The authors would like to congratulate you on this fi rst step, and we...

Result Page: 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy