|
|
|
|
|
Computer Viruses: from theory to applications (Collection IRIS)This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions... | | | | |
|
|
Who's Afraid of AI?: Fear and Promise in the Age of Thinking Machines
A penetrating guide to artificial intelligence: what it is, what it does, and how it will change our lives
At a breathtaking pace, artificial intelligence is getting better and faster at making complex decisions. AI can already identify malignant tumors on CT scans, give legal advice, out-bluff the best ... | | Software Fortresses: Modeling Enterprise ArchitecturesThis book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed... | | Guide to RISC Processors: for Programmers and EngineersPopular processor designs can be broadly divided into two categories: Complex Instruction Set Computers (CISC) and Reduced Instruction Set Computers (RISC). The dominant processor in the PC market, Pentium, belongs to the CISC category. However, the recent trend is to use the RISC designs. Even Intel has moved from CISC to RISC... |
|
|
Result Page: 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 |