Home | Amazing | Today | Tags | Publishers | Years | Search 
Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Machine Perception
Machine Perception

The field of machine perception concerns the building of machines that sense and interpret their environments. This book is about visual perception. Potential applications for such systems include tasks such as automation of industrial processes of inspection and assembly, automated medical x-ray diagnosis, vehicle guidance and...

Elements of ML Programming, ML97 Edition (2nd Edition)
Elements of ML Programming, ML97 Edition (2nd Edition)

I became interested in ML programming when I taught CS109, the introduc- tory Computer Science Foundations course at Stanford, starting in 1991. ML was used by several of the instructors of this course, including Stu Reges and Mike Cleron, to introduce concepts such as functional programming and type systems. It was also used for the...

SOA Governance: Governing Shared Services On-Premise and in the Cloud
SOA Governance: Governing Shared Services On-Premise and in the Cloud

The Definitive Guide to Governing Shared Services and SOA Projects

 SOA Governance: Governing Shared Services On-Premise and in the Cloud is the result of a multi-year project to collect proven industry practices for establishing IT governance controls specific to the adoption of SOA...

Project Management for Information Systems (5th Edition)
Project Management for Information Systems (5th Edition)

We are very pleased to present this fifth edition of Project Management for Information Systems. As with its predecessors, our ‘target audience’ fall into four groups:

  • IS project managers and systems developers who find themselves responsible for managing systems projects. Newcomers to this activity will find...
Compilers: Principles, Techniques, and Tools (2nd Edition)
Compilers: Principles, Techniques, and Tools (2nd Edition)

In the time since the 1986 edition of this book, the world of compiler design has changed significantly. Programming languages have evolved to present new compilation problems. Computer architectures offer a variety of resources of which the compiler designer must take advantage. Perhaps most interestingly, the venerable technology of...

C: How to Program (6th Edition)
C: How to Program (6th Edition)

Welcome to the C programming language—and to C++, too! This book presents leadingedge computing technologies for students, instructors and software development professionals.

At the heart of the book is the Deitel signature “live-code approach.” Concepts are presented in the context of complete working...

Configuring and Tuning Databases on the Solaris Platform
Configuring and Tuning Databases on the Solaris Platform

Modern corporations demand a high level of service from their IT environ- ments. Today's successful datacenter architectures consist of multiple tiers that use well-tuned and high-performance servers at every level.

Sun refers to this as the "end-to-end architecture." Typical tiers include powerful database...

The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection

This book is generally about software intellectual property and specifically about the field of software forensics. While you may never testify in a courtroom, attempt to deduce the true owner of a valuable program, or measure the intellectual property (IP) value of software source code, if you are at all involved with software you...

Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory

This book is based on a course in cryptography at the upper level under graduate and beginning graduate level that has been given at the University of Maryland since 1997. When designing the course, we decided on the fol lowing requirements.

• The course should be up-to-date and cover a broad selection of topics from a...

First Course in Database Systems, A (3rd Edition)
First Course in Database Systems, A (3rd Edition)

At Stanford, we are on the quarter system, and as a result, our introductory database instruction is divided into two courses. The first, CS145, is designed for students who will use database systems but, not necessarily take a job im plementing a DBMS. It is a prerequisite for CS245, which is the introduction...

Java Performance
Java Performance
Today, Java is used at the heart of the world’s largest and most critical computing systems. However, when I joined the Java team in 1997 the platform was young and just gaining popularity. People loved the simplicity of the language, the portability of bytecodes, and the safety of garbage collection (versus traditional...
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy