Home | Amazing | Today | Tags | Publishers | Years | Search 
Risk Management for Computer Security: Protecting Your Network & Information Assets
Risk Management for Computer Security: Protecting Your Network & Information Assets
In an increasingly interconnected environment, we are consistently required to develop better and more cost-effective defenses for our information systems. In the past when information security was the realm of governments and the military and when security was only concernd with the confidentiality of the information, then the concept of...
Automatic Indexing and Abstracting of Document Texts (THE KLUWER INTERNATIONAL SERIES ON INFORMATION RETRIEVAL Volume 6)
Automatic Indexing and Abstracting of Document Texts (THE KLUWER INTERNATIONAL SERIES ON INFORMATION RETRIEVAL Volume 6)
Automatic Indexing and Abstracting of Document Texts summarizes the latest techniques of automatic indexing and abstracting, and the results of their application. It also places the techniques in the context of the study of text, manual indexing and abstracting, and the use of the indexing descriptions and abstracts in systems that...
Problems & Solutions In Scientific Computing With C++ And Java Simulations
Problems & Solutions In Scientific Computing With C++ And Java Simulations
Scientific computing is a collection of tools, techniques and theories required to develop and solve mathematical models in science and engineering on a computer. The purpose of this book is to supply a collection of problems together with their detailed solution which will prove to be valuable to students as well as to research workers in the...
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers,...
JDBC: Practical Guide for Java Programmers
JDBC: Practical Guide for Java Programmers
JDBC: Practical Guide for Java Programmers is the quickest way to gain the skills required for connecting your Java application to a SQL database. Practical, tutorial-based coverage keeps you focused on the essential tasks and techniques, and incisive explanations cement your understanding of the API features you'll use again and again....
Web Caching and Its Applications (The Springer International Series in Engineering and Computer Science)
Web Caching and Its Applications (The Springer International Series in Engineering and Computer Science)
The last decade has seen tremendous growth in usage of the World Wide Web. Web caching is a technology aimed at reducing the transmission of redundant network traffic and improving access to the Web. The key idea in Web caching is to cache frequently- accessed content so that it may be used profitably later. This leads to cost savings, reduction in...
Web-to-Host Connectivity
Web-to-Host Connectivity
Nobody can dispute the incredible impact that the Web continues to have on the way in which people work, shop, research, play, and communicate. In the span of just a few short years, enterprises in nearly every industry and market have had to reevaluate the way in which they do business with their business partners and end customers. Having a...
Parallel Programming in OpenMP
Parallel Programming in OpenMP
"This book will provide a valuable resource for the OpenMP community."

- Timothy G. Mattson, Intel Corporation

"This book has an important role to play in the HPC community-both for introducing practicing professionals to OpenMP and for educating students and professionals about parallel programming. I'm happy...

Algorithms & Architectures (Neural Network Systems Techniques and Applications)
Algorithms & Architectures (Neural Network Systems Techniques and Applications)
Inspired by the structure of the human brain, artificial neural networks have been widely applied to fields such as pattern recognition, optimization, coding, control, etc., because of their ability to solve cumbersome or intractable problems by learning directly from data. An artificial neural network usually consists of a large number of simple...
Curves and Surfaces for CAGD: A Practical Guide (The Morgan Kaufmann Series in Computer Graphics)
Curves and Surfaces for CAGD: A Practical Guide (The Morgan Kaufmann Series in Computer Graphics)

This fifth edition has been fully updated to cover the many advances made in CAGD and curve and surface theory since 1997, when the fourth edition appeared. Material has been restructured into theory and applications chapters. The theory material has been streamlined using the blossoming approach; the applications material includes least squares...

Real-Time Concepts for Embedded Systems
Real-Time Concepts for Embedded Systems
'... a very good balance between the theory and practice of real-time embedded system designs.' —Jun-ichiro itojun Hagino, Ph.D., Research Laboratory, Internet Initiative Japan Inc., IETF IPv6 Operations Working Group (v6ops) co-chair 'A cl

Develop a working understanding of the common design patterns and program
...
Advanced Process Identification & Control (Control Engineering)
Advanced Process Identification & Control (Control Engineering)
The book is well written and offers a highly readable account of the advanced identification and control theory. [It] offers a straightforward and accessible introduction and can be highly recommended as the main textbook for both undergraduate and postgraduate courses on the subject. In addition, the text can also be recommended to practicing...
Result Page: 519 518 517 516 515 514 513 512 511 510 509 508 507 506 505 504 503 502 501 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy