Home | Amazing | Today | Tags | Publishers | Years | Search 
An Introduction to Optimization, 2nd Edition
An Introduction to Optimization, 2nd Edition
A modern, up-to-date introduction to optimization theory and methods
This authoritative book serves as an introductory text to optimization at the senior undergraduate and beginning graduate levels. With consistently accessible and elementary treatment of all topics, An Introduction to Optimization, Second Edition helps students build a
...
Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
VEE Pro: Practical Graphical Programming
VEE Pro: Practical Graphical Programming
With VEE 7.0 Trial Version on CD-ROM From the depths of the oceans to the deserts of Mars, VEE Pro is being used to collect data, provide automated testing and to construct remote command and telemetry interfaces. In more everyday environments, it can be found at the heart of manufacturing, process and quality control, and industrial data analysis...
Broadband Packet Switching Technologies: A Practical Guide to ATM Switches and IP Routers
Broadband Packet Switching Technologies: A Practical Guide to ATM Switches and IP Routers
The effective design of high-speed, reliable switching systems is essential for moving the huge volumes of traffic and multimedia over modern communications networks. This book explains all the main packet-switching architectures, including all theoretical and practical topics relevant to the design and management of high-speed networks. Delivering...
Security in Computing (4th Edition)
Security in Computing (4th Edition)
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information...

Workflow Modeling: Tools for Process Improvement and Application Development
Workflow Modeling: Tools for Process Improvement and Application Development
Just when process orientation has become mainstream thinking for business people and
systems people alike, it seems that the flow of process-oriented literature has pretty well
stopped. So here we are, thousands of us, up to our necks in process improvement and
information systems projects, finding that there is a real shortage of
...
Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing begins with the introduction of multimedia information applications, the need for the development of the multimedia database management systems (MDBMSs), and the important issues and challenges of multimedia systems. The temporal relations, the spatial relations, the spatio-temporal...
Design and Analysis of Distributed Algorithms (Wiley Series on Parallel and Distributed Computing)
Design and Analysis of Distributed Algorithms (Wiley Series on Parallel and Distributed Computing)
This text is based on a simple and fully reactive computational model that allows for intuitive comprehension and logical designs. The principles and techniques presented can be applied to any distributed computing environment (e.g., distributed systems, communication networks, data networks, grid networks, internet, etc.). The text provides a...
Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms: Industrial Applications
Fusion of Neural Networks, Fuzzy Systems and Genetic Algorithms: Industrial Applications
Artificial neural networks can mimic the biological information-processing mechanism in - a very limited sense. Fuzzy logic provides a basis for representing uncertain and imprecise knowledge and forms a basis for human reasoning. Neural networks display genuine promise in solving problems, but a definitive theoretical basis does not yet exist for...
Data Warehousing and Data Mining for Telecommunications (Artech House Computer Science Library)
Data Warehousing and Data Mining for Telecommunications (Artech House Computer Science Library)
Provides practical, step-by-step instructions on how to design and develop effective, costefficient data warehouses. DLC: Telecommunications Management.

Through dozens of case studies and real-world examples, this clearly written guide shows telecommunications managers how to build more effective data warehouses without wasting time and
...
Metro Ethernet
Metro Ethernet

The definitive guide to enterprise and carrier metro Ethernet applications

  • Easy to read and understand, following the style of the best-selling Internet Routing Architectures
  • Understand emerging metro Ethernet services such as point-to-point packet-leased line services and multipoint-to-multipoint VPLS
  • ...
The Best Software Writing I: Selected and Introduced by Joel Spolsky
The Best Software Writing I: Selected and Introduced by Joel Spolsky

Frustrated by the lack of well-written essays on software engineering, Joel Spolsky (of www.joelonsoftware.com fame) has put together a collection of his favorite writings on the topic.

With a nod to both the serious and funny sides of technical writing, The Best Software Writing I: Selected and Introduced by Joel Spolsky is an...

Result Page: 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy