|
|
|
|
Introduction to Cybernetics (University Paperbacks)Many workers in the biological sciences—physiologists, psychologists, sociologists—are interested in cybernetics and would like to apply its methods and techniques to their own speciality. Many have, however, been prevented from taking up the subject by an impression that its use must be preceded by a long study of electronics and... | | | | Quantum Information And Computing (Quantum Probability and White Noise Analysis)This volume constitutes the proceedings of the international conference on "Quantum Information 2003" held in Tokyo University of Science/Tokyo (Japan) from 1 to 3 November 2003, in International Institute for Advanced Studies/Kyoto (Japan) from 5 to 7 November 2003, in University of Waseda/Tokyo (Japan) from 29 to 31 October 2003, in... |
|
|
|
Algorithms For Dummies (For Dummies (Computers))
Discover how algorithms shape and impact our digital world
All data, big or small, starts with algorithms. Algorithms are mathematical equations that determine what we see—based on our likes, dislikes, queries, views, interests, relationships, and more—online. They are, in a sense, the electronic gatekeepers to... | | RFID SecurityRFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to... | | Stealing the Network: How to Own a ShadowThe best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.
Stealing the Network: How to Own a Shadow is the final book in Syngress... |
|
|
Result Page: 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 |