Home | Amazing | Today | Tags | Publishers | Years | Search 
Cryptographic  Boolean  Functions and Applications
Cryptographic Boolean Functions and Applications
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).

Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean
...
Beautiful Data: The Stories Behind Elegant Data Solutions
Beautiful Data: The Stories Behind Elegant Data Solutions
In this insightful book, you'll learn from the best data practitioners in the field just how wide-ranging -- and beautiful -- working with data can be. Join 39 contributors as they explain how they developed simple and elegant solutions on projects ranging from the Mars lander to a Radiohead video.

With Beautiful
...
Vehicular Networks: From Theory to Practice
Vehicular Networks: From Theory to Practice
Cohesively integrating the state of the art in this emerging field, this guide presents many issues involved in vehicular networking, including traffic engineering, human factors studies, and novel computer science research. It covers traffic monitoring and traffic flow modeling, innovative applications enabled by vehicular networks, routing and...
Medical Data Management
Medical Data Management
Careful documentation is essential in all fields of medicine and health care, whether it may serve the treatment of patients, compliance with legal obligations, reimbursement and cost analysis, quality assurance, or clinical research. Clinical documentation must be conducted in a systematic way; otherwise, there is a danger of it becoming a...
The Next Leap in Productivity: What Top Managers Really Need to Know about Information Technology
The Next Leap in Productivity: What Top Managers Really Need to Know about Information Technology
What Top Managers Really Need to Know about Information Technology

"These kinds of productivity principles are not mere theory. When we put these same principles into effect, our productivity went up more than we had thought possible. And our employee morale went up, too. It became easier to write code the right way and harder to make...

Algorithms of the Intelligent Web
Algorithms of the Intelligent Web
Web 2.0 applications provide a rich user experience, but the parts you can't see are just as important-and impressive. They use powerful techniques to process information intelligently and offer features based on patterns and relationships in data. Algorithms of the Intelligent Web shows readers how to use the same techniques employed by...
Introduction to e-Business: Management and Strategy
Introduction to e-Business: Management and Strategy
An introductory text that offers an understanding of the key concepts and issues in ebusiness.

An Introduction to e-Business provides the contemporary knowledge of the key issues affecting the modern e-business environment and links theory and practice of management strategies relating to e-business. This book brings together
...
Alan Turing's Automatic Computing Engine: The Master Codebreaker's Struggle to Build the Modern Computer
Alan Turing's Automatic Computing Engine: The Master Codebreaker's Struggle to Build the Modern Computer
the amount of information collected by the editor is huge and it offers interesting reading for anybody with a deep interest in computer history. EMS Newsletter Wonderful...The Essential Turing is a must. J. Bowen, The Times Higher Education Supplement This book (and the related website of the Turing Archive) will be an invaluable reference for...
The Future of Telecommunications Industries
The Future of Telecommunications Industries
Communication is a crucial basis for the development of each individual's social identity as well as for intellectual and commercial exchange and economic development. Therefore, the question is not whether telecommunications industries have a future but what kind of future old and new players will have, given the dynamic changes in technologies...
Solid Waste Analysis and Minimization: A Systems Approach: The Systems Approach
Solid Waste Analysis and Minimization: A Systems Approach: The Systems Approach

Implement successful solid waste analysis and minimization strategies

Provide sustainable solutions to solid waste issues with help from this hands-on guide. Solid Waste Analysis and Minimization: A Systems Approach offers up-to-date technical details on current and potential solid waste minimization practices....

The Design of Climate Policy (CESifo Seminar Series)
The Design of Climate Policy (CESifo Seminar Series)
Debates over post-Kyoto Protocol climate change policy often take note of two issues: the feasibility and desirability of international cooperation on climate change policies, given the failure of the United States to ratify Kyoto and the very limited involvement of developing countries, and the optimal timing of climate policies. In this book...
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can...

Result Page: 588 587 586 585 584 583 582 581 580 579 578 577 576 575 574 573 572 571 570 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy