Home | Amazing | Today | Tags | Publishers | Years | Search 
Sage Beginner's Guide
Sage Beginner's Guide

Results matter, whether you are a mathematician, scientist, or engineer. The time that you spend doing tedious mathematical calculations could be spent in more productive ways. Sage is an open-source mathematical software system that helps you perform many mathematical tasks. There is no reason to compute integrals or perform algebraic...

Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition
Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition

This book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and...

Algorithmic Graph Theory and Perfect Graphs (Computer science and applied mathematics)
Algorithmic Graph Theory and Perfect Graphs (Computer science and applied mathematics)

Algorithmic Graph Theory and Perfect Graphs, first published in 1980, has become the classic introduction to the field. This new Annals edition continues to convey the message that intersection graph models are a necessary and important tool for solving real-world problems. It remains a stepping stone from which the reader may embark on one...

Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Computer Processing of Remotely-Sensed Images: An Introduction
Computer Processing of Remotely-Sensed Images: An Introduction

Environmental remote sensing is the measurement, from a distance, of the spectral features of the Earth’s surface and atmosphere. These measurements are normally made by instruments carried by satellites or aircraft, and are used to infer the nature and characteristics of the land or sea surface, or of the atmosphere, at the...

Graph-Theoretic Concepts in Computer Science: 37th International Workshop, WG 2011
Graph-Theoretic Concepts in Computer Science: 37th International Workshop, WG 2011

The 37th International Workshop on Graph-Theoretic Concepts in Computer Science (WG 2011) took place in Tepl´a Monastery, Czech Republic, during June 21–24, 2011. It was attended by 80 participants who came from all over the world not only to deliver or listen to interesting talks, but also to celebrate the 65th birthday of Ludek...

Logic of Analog and Digital Machines
Logic of Analog and Digital Machines
Computer Science is a very young discipline compared to most others. Alan Turing published the seminal paper of the field in 1936. Around the same time, the militaries in Germany, UK, and US commissioned the first digital electronic computer projects. One of these, the Colossus at Bletchley Park in the UK, was used to break the...
Java Programming 24-Hour Trainer (Wrox Programmer to Programmer)
Java Programming 24-Hour Trainer (Wrox Programmer to Programmer)
It doesn’t take a rocket scientist to notice the recent serious decline in the publishing of computer books, to say nothing of computer magazines. I enjoy reading books about software and visit the nearby Barnes and Noble at least twice a month. During the last three years the number of bookcases dedicated to computer books...
Computer Science: The Hardware, Software and Heart of It
Computer Science: The Hardware, Software and Heart of It

Computer Science: The Hardware, Software and Heart of It focuses on the deeper aspects of the two recognized subdivisions of Computer Science, Software and Hardware. These subdivisions are shown to be closely interrelated as a result of the stored-program concept. Computer Science: The Hardware, Software and Heart of It includes certain...

Analytical Characterization of Aluminum, Steel, and Superalloys
Analytical Characterization of Aluminum, Steel, and Superalloys

The Analytical Characterization of Aluminum, Steel, and Superalloys addresses the needs of the practicing materials scientist and engineer, whether in an industrial or university setting, and the advanced student. This handbook provides a fundamental overview of a wide range of characterization methodologies and does not provide an...

Biomedical Applications of Proteomics
Biomedical Applications of Proteomics

In medicine, as in any other life sciences discipline, research should start by raising a question (hypothesis) to solve a problem. Then the scientist should select the most appropriated method(s) to answer the question and solve the dilemma. The obtained intermediate and final results may answer the question or may raise additional...

Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy