|
|
|
|
| | Variable-length Codes for Data CompressionMost data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-known codes that have useful properties - such as those containing certain bit patterns, or those that are robust - and these can be useful. This book brings this large set of codes to the attention of... | | Organic Synthesis: The Disconnection ApproachThis book will help students to design their own organic synthesis, giving a wide coverage of synthetic methods. The disconnection approach is used throughout so that starting materials are chosen after analysing the structure of the target molecule. There are forty chapters: those on the synthesis of given types of molecule alternate with strategy... |
|
Configuring Symantec AntiVirus Corporate EditionAt some time in the last 15 years many of us blinked, and upon opening our eyes we found the world on the verge of becoming one large network. Public and private networks were interconnected both far and near, and now in your corner of this interconnected puzzle, virus protection for the network has become your... | | The International Handbook of Computer SecurityThis book is a one-stop resource to help executives and computer professionals protect their systems and data from a myriad of internal and external threats. Addressing a wide range of security issues, it provides practical guidance on topics such as: physical security procedures * data preservation and protection * hardware and software protection... | | Windows Server 2008 UnleashedWindows Server 2008 Unleashed covers the planning, design, prototype testing, implementation, migration, administration, and support of a Windows 2008 and Active Directory environment, based on more than three and a half years of early adopter experience in full production environments. This book addresses not only what is new with Windows... |
|
|
|
|
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 |