Home | Amazing | Today | Tags | Publishers | Years | Search 
The Mathematics of Coding Theory
The Mathematics of Coding Theory

This book is intended to be accessible to undergraduate students with two years of typical mathematics experience, most likely meaning calculus with a little linear algebra and differential equations. Thus, specifically, there is no assumption oLa background inabstr&;t algebra or number theory, nor of probability, nor of linear...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the...

ATM & MPLS Theory & Application: Foundations of Multi-Service Networking
ATM & MPLS Theory & Application: Foundations of Multi-Service Networking

Why did we decide to update this book on ATM once again? Mainly, because the publisher asked us to! Seriously, though, in the fast moving telecommunications industry, a lot has happened since the publication of the last edition in 1998. In case you have been asleep, Internet-based communication is clearly the killer application for...

Django JavaScript Integration: AJAX and jQuery
Django JavaScript Integration: AJAX and jQuery

In this book, we will be exploring Django JavaScript integration and build an Ajax application using jQuery. We will build a Web 2.0 intranet employee directory, and we will aim for a solution that is Pythonic in more ways than one.

Web development that is more "Pythonic" than just Python

This book is intended...

Blender 2.5 Materials and Textures Cookbook
Blender 2.5 Materials and Textures Cookbook

The Blender 3D suite is probably one of the most used 3D creation and animation tools currently in existence. The reason for that popularity is both its tool set and the extraordinary fact that it can be downloaded free of charge. Blender has been around since 1998 but it was not until it entered the GNU General Public License, open source...

Just Enough Software Architecture: A Risk-Driven Approach
Just Enough Software Architecture: A Risk-Driven Approach

This is a practical guide for software developers, and different than other software architecture books. Here's why:

It teaches risk-driven architecting. There is no need for meticulous designs when risks are small, nor any excuse for sloppy designs when risks threaten your success. This book describes a way to do just...

Oracle CRM On Demand Deployment Guide (Osborne ORACLE Press Series)
Oracle CRM On Demand Deployment Guide (Osborne ORACLE Press Series)

In less than a decade, the online delivery of software has transformed the business software landscape. The concept of online delivery is simple: A software company develops an application, hosts the software on its own servers, and makes it available to companies over the Internet. Companies sign up to use the application and pay for...

Scientific Data Mining and Knowledge Discovery: Principles and Foundations
Scientific Data Mining and Knowledge Discovery: Principles and Foundations

This book suits both graduate students and researchers with a focus on discovering knowledge from scientific data. The use of computational power for data analysis and knowledge discovery in scientific disciplines has found its roots with the revolution of high-performance computing systems. Computational science in physics,...

Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems

It is a great pleasure for me to write this foreword about a book that comes out of one of the first research projects funded by ANR, the French National Research Agency. ANR was established by the French government in 2005 to fund research projects, based on competitive schemes giving researchers the best opportunities to realize...

Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation
Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation

This volume contains a collection of studies in the areas of complexity theory and foundations of cryptography. These studies were conducted at different times during the last couple of decades. Although many of these studies have been referred to by other works, none of them was formally published before.

Indeed, this volume...

Excel 2010 Financials Cookbook
Excel 2010 Financials Cookbook

Excel is an extremely powerful tool that is made to handle many varieties of data. Regardless of the job you do, chances are you have had to use Excel at some time in your career, or you will. Regardless of your reason for using Excel, many users never realize the full potential of the software, relegating Excel to not much more than a list...

Character Development in Blender 2.5
Character Development in Blender 2.5

I got started in Blender approximately eight and a half years ago. At the time, there were very few tutorials or other training resources available. Essentially, the only resource around was the people of the Blender Community, who was active through the online forum, http://blenderartists.org. With nothing but the generous time of...

Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy