Home | Amazing | Today | Tags | Publishers | Years | Search 
Cyber Security Policy Guidebook
Cyber Security Policy Guidebook

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of...

Taming The Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced Analytics
Taming The Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced Analytics

You receive an e-mail. It contains an offer for a complete personal computer system. It seems like the retailer read your mind since you were exploring computers on their web site just a few hours prior….

As you drive to the store to buy the computer bundle, you get an offer for a discounted coffee from the coffee shop you...

Smashing Android UI (Smashing Magazine Book Series)
Smashing Android UI (Smashing Magazine Book Series)

Designers and developers, create smashing apps for Android devices

If you're developing applications for Android smartphones and tablets, you know it isn't enough just to create the app. The application has to be intuitive, well laid out, and easy to use. Smashing Android UI shows you just how to do that....

On and Off-Chip Crosstalk Avoidance in VLSI Design
On and Off-Chip Crosstalk Avoidance in VLSI Design

Deep Sub-Micron (DSM) processes present many changes to Very Large Scale Integration (VLSI) circuit designers. One of the greatest challenges is crosstalk, which becomes significant with shrinking feature sizes of VLSI fabrication processes. The presence of crosstalk greatly limits the speed and increases the power consumption of the IC...

High-Performance Scientific Computing: Algorithms and Applications
High-Performance Scientific Computing: Algorithms and Applications

This book presents the state of the art in parallel numerical algorithms, applications, architectures, and system software. The book examines various solutions for issues of concurrency, scale, energy efficiency, and programmability, which are discussed in the context of a diverse range of applications. Features: includes contributions from...

MongoDB Applied Design Patterns
MongoDB Applied Design Patterns

Whether you’re building a social media site or an internal-use enterprise application, this hands-on guide shows you the connection between MongoDb and the business problems it’s designed to solve. You’ll learn how to apply MongoDb design patterns to several challenging domains, such as ecommerce, content...

Applied Computer Science
Applied Computer Science

Applied Computer Science presents a unique approach for introductory courses that will engage students with relevant topics from a variety of disciplines, encourage their natural creativity, and prepare them for independent projects. Lab assignments are accessible and carefully sequenced for maximum impact. Students are able to write their...

Pyomo - Optimization Modeling in Python (Springer Optimization and Its Applications, Vol. 67)
Pyomo - Optimization Modeling in Python (Springer Optimization and Its Applications, Vol. 67)

This book provides a complete and comprehensive reference/guide to Pyomo (Python Optimization Modeling Objects) for both beginning and advanced modelers, including students at the undergraduate and graduate levels, academic researchers, and practitioners. The text illustrates the breadth of the modeling and analysis capabilities that are...

Modern Software Engineering Concepts and Practices: Advanced Approaches
Modern Software Engineering Concepts and Practices: Advanced Approaches

Software engineering has advanced rapidly in recent years in parallel with the complexity and scale of software systems.  New requirements in software systems yield innovative approaches that are developed either through introducing new paradigms or extending the capabilities of well-established approaches.

Modern Software...

Model Reduction for Circuit Simulation (Lecture Notes in Electrical Engineering)
Model Reduction for Circuit Simulation (Lecture Notes in Electrical Engineering)

Simulation based on mathematical models plays a major role in computer aided design of integrated circuits (ICs). Decreasing structure sizes, increasing packing densities and driving frequencies require the use of refined mathematical models, and to take into account secondary, parasitic effects. This leads to very high dimensional problems...

RFID Security and Privacy: Concepts, Protocols, and Architectures (Lecture Notes in Electrical Engineering)
RFID Security and Privacy: Concepts, Protocols, and Architectures (Lecture Notes in Electrical Engineering)

The vision of a world in which privacy persists and security is ensured but the full potential of the technology is nevertheless tapped guides this work. It is argued that security and privacy can be ensured using technical safeguards if the whole RFID system is designed properly. The challenge is immense since many constraints exist for...

Activity Recognition in Pervasive Intelligent Environments (Atlantis Ambient and Pervasive Intelligence)
Activity Recognition in Pervasive Intelligent Environments (Atlantis Ambient and Pervasive Intelligence)

This book consists of a number of chapters addressing different aspects of activity recognition, roughly in three main categories of topics. The first topic will be focused on activity modeling, representation and reasoning using mathematical models, knowledge representation formalisms and AI techniques. The second topic will concentrate on...

Result Page: 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy