Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Language Features: With Modules, Streams, Threads, I/O, and Lambda Expressions
Java Language Features: With Modules, Streams, Threads, I/O, and Lambda Expressions
Work with essential and advanced features of the Java programming language such as Java modules development, lambda expressions (closures), inner classes, threads, I/O, Collections, garbage collection, and more. Author Kishori Sharan provides over 50 diagrams and 290 complete programs to help you visualize and better understand the topics...
Conscious Experience: A Logical Inquiry
Conscious Experience: A Logical Inquiry

A distinguished philosopher offers a novel account of experience and reason, and develops our understanding of conscious experience and its relationship to thought: a new reformed empiricism.

The role of experience in cognition is a central and ancient philosophical concern. How, theorists ask, can our private...

Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust...
Programming Languages: Principles and Practices
Programming Languages: Principles and Practices

Kenneth Louden and Kenneth Lambert's new edition of PROGRAMMING LANGUAGES: PRINCIPLES AND PRACTICE, 3E gives advanced undergraduate students an overview of programming languages through general principles combined with details about many modern languages. Major languages used in this edition include C, C++, Smalltalk, Java, Ada, ML,...

Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Analysis and Synthesis for Discrete-Time Switched Systems: A Quasi-Time-Dependent Method (Studies in Systems, Decision and Control)
Analysis and Synthesis for Discrete-Time Switched Systems: A Quasi-Time-Dependent Method (Studies in Systems, Decision and Control)

This book presents recent theoretical advances in the analysis and synthesis of discrete-time switched systems under the time-dependent switching scheme, including stability and disturbance attenuation performance analysis, control and filtering, asynchronous switching, finite-time analysis and synthesis, and reachable set...

The Art of Error Correcting Coding
The Art of Error Correcting Coding
Building on the success of the first edition, which offered a practical introductory approach to the techniques of error concealment, this book, now fully revised and updated, provides a comprehensive treatment of the subject and includes a wealth of additional features. The Art of Error Correcting Coding, Second Edition explores...
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
The goal of this book is to teach computational scientists and engineers how to develop tailored, flexible, and efficient working environments built from small programs (scripts) written in the easy-to-learn, very high-level language Python. The focus is on examples and applications of relevance to computational science: gluing existing...
Luminescence and the Solid State, Second Edition (Studies in Inorganic Chemistry)
Luminescence and the Solid State, Second Edition (Studies in Inorganic Chemistry)
Since the first date of publication of this book in 1991, the subject of phosphors and luminescence has assumed even more importance in the overall scheme of technological development. Many new types of displays have appeared which depend upon phosphors in their operation. Some of these were pure conjecture in 1991 but are a reality in 2004....
Configuring Windows 2000 Without Active Directory
Configuring Windows 2000 Without Active Directory
In Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to...
Legal Knowledge and Information Systems:  JURIX 2006: The Nineteenth Annual Conference - Volume 152 Frontiers in Artificial Intelligence and Applications
Legal Knowledge and Information Systems: JURIX 2006: The Nineteenth Annual Conference - Volume 152 Frontiers in Artificial Intelligence and Applications
This volume contains the Proceedings of the Nineteenth JURIX Conference on Legal Knowledge and Information Systems (JURIX 2006), December 7th–9th, Université Pantheon Assas – Paris II, France. This year we hoped to put two new topics on the agenda: Artificial Intelligence in police and intelligence services and the impact of AI...
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy