Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Privacy and Security for Cloud Computing (Computer Communications and Networks)
Privacy and Security for Cloud Computing (Computer Communications and Networks)

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic...

Evolutionary Algorithms in Molecular Design (Methods and Principles in Medicinal Chemistry)
Evolutionary Algorithms in Molecular Design (Methods and Principles in Medicinal Chemistry)
Nature has solved its most complicated problem, the creation, variation, and improvement of living organisms, in a simple and efficient manner. Starting from primitive forms in earth history, mutation and crossover produced variations that had to struggle for their existence and to compete with their ancestors and genetically...
Scrambling Techniques for CDMA Communications
Scrambling Techniques for CDMA Communications
Scrambling Techniques for CDMA Communications addresses spreading, scrambling, and synchronization techniques for use in inter-cell synchronous and asynchronous CDMA systems, including the IMT-2000. It provides fundamental background material for sequences and shift register generators, and demonstrates various acquisition techniques...
Pro Windows PowerShell
Pro Windows PowerShell
I remember the first time I got to play with Windows PowerShell—I had some spare time on my hands, and after reading a blog post, I quickly set off to download the unofficial pre-release bits that were available at the time. I originally had very low expectations about the tool—all I wanted was a shell that is up to par with its UNIX...
Blender 2.5 Lighting and Rendering
Blender 2.5 Lighting and Rendering

Each chapter develops a different aspect of a Blender technique. The book is essentially a step-by-step tutorial, which builds up your knowledge throughout. It has practical examples such as lighting a tricycle in open space, lighting a wine bottle on a table, and lighting a room that has a lamp as well as sunlight coming in through the...

Algebraic Theory of Automata Networks (SIAM Monographs on Discrete Mathematics and Applications, 11)
Algebraic Theory of Automata Networks (SIAM Monographs on Discrete Mathematics and Applications, 11)
This self-contained monograph covers the foundations of what is currently known about automata networks, giving the reader sufficient theoretical background to be at the forefront of research in many related areas. Alexandra Kireeva, Mathematical Reviews

Algebraic Theory of Automata Networks investigates automata networks as
...
3ds Max 2012 Bible
3ds Max 2012 Bible
Every time I enter the computer room (which my wife calls the dungeon), my wife still says that I am off to my “fun and games.” I, as always, flatly deny this accusation, saying that it is serious work that I am involved in. But later, when I emerge with a twinkle in my eye and excitedly ask her to take a look at my...
Computing with Instinct: Rediscovering Artificial Intelligence
Computing with Instinct: Rediscovering Artificial Intelligence

Simplicity in nature is the ultimate sophistication. The world's magnificence has been enriched by the inner drive of instincts, the profound drive of our everyday life. Instinct is an inherited behavior that responds to environmental stimuli. Instinctive computing is a computational simulation of biological and cognitive instincts, which...

Java I/O
Java I/O
Because it doesn't provide a printf() function like C/C++, some developers think Java isn't up to snuff with files and streams. Author Rusty Harold Elliotte argues against this notion in Java I/O, a book that shows how Java's stream support can help simplify network programming, internationalization, and even compression and...
Origins of Objectivity
Origins of Objectivity

My primary aim in this book is to understand and explain origins of representational aspects of mind, particularly in representation of the physical world. Under what conditions does accurate objective representation of the physical world begin? Since the inquiry centers on what it is to represent the physical world in this initial way, and...

Information Warfare and Organizational Decision-Making
Information Warfare and Organizational Decision-Making
Organizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because...
Result Page: 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy