Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Elements of Quantum Information
Elements of Quantum Information
'Elements of Quantum Information' introduces the reader to the fascinating field of quantum information processing, which lives on the interface between computer science, physics, mathematics, and engineering. This interdisciplinary branch of science thrives on the use of quantum mechanics as a resource for high potential modern applications. With...
Networking Fundamentals: Wide, Local and Personal Area Communications
Networking Fundamentals: Wide, Local and Personal Area Communications

Information networking has emerged as a multidisciplinary diversified area of research over the past few decades. From traditional wired telephony to cellular voice telephony and from wired access to wireless access to the Internet, information networks have profoundly impacted our lifestyle. At the time of writing, over 3 billion...

Implementing Splunk: Big Data Reporting and Development for Operational Intelligence
Implementing Splunk: Big Data Reporting and Development for Operational Intelligence

Splunk is a data collection, indexing, and visualization engine for operational intelligence. It's a powerful and versatile search and analysis engine that lets you investigate, troubleshoot, monitor, alert, and report on everything that's happening in your entire IT infrastructure from one location in real time. Splunk collects,...

Parallel Genetic Algorithms: Theory and Real World Applications (Studies in Computational Intelligence)
Parallel Genetic Algorithms: Theory and Real World Applications (Studies in Computational Intelligence)

This book is the result of several years of research trying to better characterize parallel genetic algorithms (pGAs) as a powerful tool for optimization, search, and learning. Readers can learn how to solve complex tasks by reducing their high computational times. Dealing with two scientific fields (parallelism and GAs) is always...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Handbook of Computer Vision and Applications, Volume 1
Handbook of Computer Vision and Applications, Volume 1
This handbook o ers a fresh approach to computer vision. The whole vision process from image formation to measuring, recognition, or reacting is regarded as an integral process. Computer vision is understood as the host of techniques to acquire, process, analyze, and understand complex higher-dimensional data from our environment...
Collaborative Design and Learning: Competence Building for Innovation (International Series on Technology Policy and Innovation)
Collaborative Design and Learning: Competence Building for Innovation (International Series on Technology Policy and Innovation)

In today's knowledge-driven economy, the ability to share insight and know-how is essential for driving innovation and growth. In this groundbreaking volume, scholars from around the world demonstrate how communication and information technologies are enabling dynamic project design and management practices that challenge traditional...

Control Engineering: A Modern Approach
Control Engineering: A Modern Approach

An exciting new text for the advanced controls course, Control Engineering: A Modern Approach breaks with tradition by introducing a number of new topics--robust controls, for example--and omitting a number of topics dated by the use of digital computers. Bélanger gives the student a real introduction to control engineering...

The Socioecological Educator: A 21st Century Renewal of Physical, Health,Environment and Outdoor Education
The Socioecological Educator: A 21st Century Renewal of Physical, Health,Environment and Outdoor Education

This volume offers an alternative vision for education and has been written for those who are passionate about teaching and learning, in schools, universities and in the community, and providing  people with the values, knowledge and skills needed to face complex social and environmental challenges. Working across boundaries the...

Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

Synthetic Metal Containing Polymers
Synthetic Metal Containing Polymers
The development of the field of synthetic metal-containing polymers - where metal atoms form an integral part of the main chain or side group structure of a polymer - aims to create new materials which combine the processability of organic polymers with the physical or chemical characteristics associated with the metallic element or complex. This...
Result Page: 144 143 142 141 140 139 138 137 136 135 134 133 132 131 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy