Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algorithmic Cryptanalysis (Cryptography and Network Security)
Algorithmic Cryptanalysis (Cryptography and Network Security)
Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,...
Prevention of Blindness from Diabetes Mellitus: Report of a WHO Consultation
Prevention of Blindness from Diabetes Mellitus: Report of a WHO Consultation

Diabetes mellitus is an important public health problem worldwide, and more than 75% of patients who have had diabetes mellitus for more than 20 years will have some sort of retinopathy. Diabetic retinopathy correlates with the duration of diabetes; thus with increasing life expectancy, diabetic retinopathy and the ensuing blindness will tend...

Temporary Appropriation in Cities: Human Spatialisation in Public Spaces and Community Resilience
Temporary Appropriation in Cities: Human Spatialisation in Public Spaces and Community Resilience

This book conceptualises and illustrates temporary appropriation as an urban phenomenon, exploring its contributions to citizenship, urban social sustainability and urban health. It explains how some forms of appropriation can be subversive, existing in a grey area between legal and illegal activities in the city.

The...

Error Correction Coding: Mathematical Methods and Algorithms
Error Correction Coding: Mathematical Methods and Algorithms
An unparalleled learning tool and guide to error correction coding

Error correction coding techniques allow the detection and correction of errors occurring during the transmission of data in digital communication systems. These techniques are nearly universally employed in modern communication systems, and are thus an important component of...

Never Threaten to Eat Your Co-Workers: Best of Blogs
Never Threaten to Eat Your Co-Workers: Best of Blogs

Do you occasionally wonder,

  • What kind of person works at a porn video store?
  • Do public defenders believe in their clients?
  • What does a reporter feel when he visits war-torn Iraq?
  • What happens after a child star falls into obscurity?

Thanks to Web logs, or...

Space-Time Design of the Public City (Urban and Landscape Perspectives)
Space-Time Design of the Public City (Urban and Landscape Perspectives)

Time has become an increasingly important topic in urban studies and urban planning. The spatial-temporal interplay is not only of relevance for the theory of urban development and urban politics, but also for urban planning and governance. The space-time approach focuses on the human being with its various habits and routines in the city....

The Future of Public Housing: Ongoing Trends in the East and the West
The Future of Public Housing: Ongoing Trends in the East and the West

Public housing was once an important strand in western housing policies, but is seldom seen as a mainstream policy instrument for the future. In contrast, in many East Asian countries large public housing programs are underway. Behind these generalizations, there are exceptions, too. By including perspectives of scholars from across the...

Probability: With Applications and R
Probability: With Applications and R

An introduction to probability at the undergraduate level

Chance and randomness are encountered on a daily basis. Authored by a highly qualified professor in the field, Probability: With Applications and R delves into the theories and applications essential to obtaining a thorough understanding of probability.

...
Solaris Operating Environment Boot Camp
Solaris Operating Environment Boot Camp
The aim of this book is not to be just another "Guide for System Administrators," but rather a workshop manual that describes the tasks that need to be performed to build a complex network using the standard components delivered with the system.

We present the chapters in the same chronological order that the system administrator...

Business Continuity Planning: A Step-by-Step Guide with Planning Forms on CD-ROM, Third Edition
Business Continuity Planning: A Step-by-Step Guide with Planning Forms on CD-ROM, Third Edition
Geared toward small and medium-sized firms, this easy-to-use, step-by-step guide provides the basic information to enable firms to start the development of their plans in the "classical" business continuity planning manner.

In this book, Ken Fulmer has provided us with a clear, easy-to-use resource for business continuity: a...

IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World
IMS Multimedia Telephony service has been standardized in 3GPP as the replacement of the circuit switched telephony service in cellular networks. The multimedia telephony service consists of several service components such as voice, video and text. ‘IMS Multimedia Telephony over Cellular Systems’ provides a comprehensive overview of the...
The Distance Education Evolution: Issues and Case Studies
The Distance Education Evolution: Issues and Case Studies
The Distance Education Evolution: Case Studies addresses issues regarding the development and design of online courses, and the implementation and evaluation of an online learning program. Several chapters include design strategies for online courses that range from the specific to the universal. Many authors address pedagogical issues from both a...
unlimited object storage image
Result Page: 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy