



The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on oftenoverlooked documents leaked by Edward Snowden, realworld case studies of cyber operations, and policymaker perspectives to show that...   New Perspectives HTML5 and CSS3: Comprehensive
Now you can master Web page design as you learn from the unique, handson approach found in NEW PERSPECTIVES HTML5 AND CSS3: COMPREHENSIVE, 7E. Each tutorial in this complete book challenges you to put into practice the concepts you have just learned. Every tutorial includes a basic statement of the problem, the goals you should achieve, and a...   Computational Physics: Problem Solving with Python
The use of computation and simulation has become an essential part of the scientific process. Being able to transform a theory into an algorithm requires significant theoretical insight, detailed physical and mathematical understanding, and a working level of competency in programming.
This upperdivision text provides an... 

Sampling Algorithms (Springer Series in Statistics)
This book is based upon courses on sampling algorithms. After having used
scattered notes for several years, I have decided to completely rewrite the
material in a consistent way. The books of Brewer and Hanif (1983) and
H´ajek (1981) have been my works of reference. Brewer and Hanif (1983) have
drawn up an...     


  JAVA DESIGN PATTERNS
If a problem occurs over and over again, a solution to that problem has been used
effectively. That solution is described as a pattern. The design patterns are languageindependent
strategies for solving common objectoriented design problems. When you
make a design, you should know the names of some common solutions. Learning design...   


Result Page: 238 237 236 235 234 233 232 231 230 229 