Embeddings of discrete metric spaces into Banach spaces recently became an important tool in computer science and topology. The book will help readers to enter and to work in this very rapidly developing area having many important connections with different parts of mathematics and computer science.
Most networks and databases that humans have to deal with contain large, albeit finite number of units. Their structure, for maintaining functional consistency of the components, is essentially not random and calls for a precise quantitative description of relations between nodes (or data units) and all network components. This book is an...
SQL works with databases to insert and extract data and is an international standard for manipulating data in databases. This hands-on resource covers everything from a review of SQL basics and database design to creating your own databases and using the SQL language in a variety of database applications.
What Every Senior Manager and Consultant Should Know About Managing Effective IT Departments
"This book sheds light on one of the most challenging topics for corporate officers –how to create and manage a high-performance IT department and obtain higher returns from technology-invested capital. The techniques and tools provided show...
Every partner company of Cisco Systems needs a number of Cisco-certified people on its staff. While the basic Cisco Certified Network Associate (CCNA) exam will satisfy basic Cisco requirements, the Cisco Certified Design Associate (CCDA) indicates more rigorous training and greater capability. Job applicants with CCDAs will outshine CCNAs every...
Effective Perl Programming is a gem of a Perl book. Its author, Joseph Hall, is a well-known Perl instructor and frequent poster on the seminal comp.lang.perl.misc newsgroup. The book's technical editor is none other than Randal Schwartz, noted Net personality, enigmatic author of Learning Perl, and contributor to Programming...
"In this book, Andy Baxevanis and Francis Ouellette . . . have undertaken the difficult task of organizing the knowledge in this field in a logical progression and presenting it in a digestible form. And they have done an excellent job. This fine text will make a major impact on biological research and, in turn, on progress in biomedicine. We...
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...
To help you navigate the large number of new data tools available, this guide describes 60 of the most recent innovations, from NoSQL databases and MapReduce approaches to machine learning and visualization tools. Descriptions are based on first-hand experience with these tools in a production environment.
This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment
Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book...
In this text we present a technical overview of the emerging field of quantum computation along with new research results by the authors. What distinguishes our presentation from that of others is our focus on the relationship between quantum computation and computer science. Specifically, our emphasis is on the computational model of quantum...