Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Metric Embeddings (de Gruyter Studies in Mathematics)
Metric Embeddings (de Gruyter Studies in Mathematics)

Embeddings of discrete metric spaces into Banach spaces recently became an important tool in computer science and topology. The book will help readers to enter and to work in this very rapidly developing area having many important connections with different parts of mathematics and computer science.

The purpose of the book is to...

Random Walks and Diffusions on Graphs and Databases: An Introduction (Springer Series in Synergetics)
Random Walks and Diffusions on Graphs and Databases: An Introduction (Springer Series in Synergetics)

Most networks and databases that humans have to deal with contain large, albeit finite number of units. Their structure, for maintaining functional consistency of the components, is essentially not random and calls for a precise quantitative description of relations between nodes (or data units) and all network components. This book is an...

Beginning SQL (Programmer to Programmer)
Beginning SQL (Programmer to Programmer)
SQL works with databases to insert and extract data and is an international standard for manipulating data in databases. This hands-on resource covers everything from a review of SQL basics and database design to creating your own databases and using the SQL language in a variety of database applications.

Packed with essential code, theories,...

The Executive's Guide to Information Technology
The Executive's Guide to Information Technology
What Every Senior Manager and Consultant Should Know About Managing Effective IT Departments

"This book sheds light on one of the most challenging topics for corporate officers –how to create and manage a high-performance IT department and obtain higher returns from technology-invested capital. The techniques and tools provided show...

CCDA Exam Certification Guide (CCDA Self-Study, 640-861), Second Edition
CCDA Exam Certification Guide (CCDA Self-Study, 640-861), Second Edition
Every partner company of Cisco Systems needs a number of Cisco-certified people on its staff. While the basic Cisco Certified Network Associate (CCNA) exam will satisfy basic Cisco requirements, the Cisco Certified Design Associate (CCDA) indicates more rigorous training and greater capability. Job applicants with CCDAs will outshine CCNAs every...
Effective Perl Programming: Writing Better Programs With Perl
Effective Perl Programming: Writing Better Programs With Perl
Effective Perl Programming is a gem of a Perl book. Its author, Joseph Hall, is a well-known Perl instructor and frequent poster on the seminal comp.lang.perl.misc newsgroup. The book's technical editor is none other than Randal Schwartz, noted Net personality, enigmatic author of Learning Perl, and contributor to Programming...
Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins, Second Edition
Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins, Second Edition
"In this book, Andy Baxevanis and Francis Ouellette . . . have undertaken the difficult task of organizing the knowledge in this field in a logical progression and presenting it in a digestible form. And they have done an excellent job. This fine text will make a major impact on biological research and, in turn, on progress in biomedicine. We...
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Big Data Glossary
Big Data Glossary

To help you navigate the large number of new data tools available, this guide describes 60 of the most recent innovations, from NoSQL databases and MapReduce approaches to machine learning and visualization tools. Descriptions are based on first-hand experience with these tools in a production environment.

This handy...

Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach
Design, Deployment and Performance of 4G-LTE Networks: A Practical Approach

This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment

Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book...

Hands-On Data Structures and Algorithms with Rust: Learn programming techniques to build effective, maintainable, and readable code in Rust 2018
Hands-On Data Structures and Algorithms with Rust: Learn programming techniques to build effective, maintainable, and readable code in Rust 2018

Design and implement efficient programs by exploring modern Rust data structures and algorithms

Key Features

  • Use data structures such as arrays, stacks, trees, lists, and graphs with real-world examples
  • Learn the functional and reactive implementations of traditional data...
Quantum Computer Science (Synthesis Lectures on Quantum Computing)
Quantum Computer Science (Synthesis Lectures on Quantum Computing)
In this text we present a technical overview of the emerging field of quantum computation along with new research results by the authors. What distinguishes our presentation from that of others is our focus on the relationship between quantum computation and computer science. Specifically, our emphasis is on the computational model of quantum...
unlimited object storage image
Result Page: 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy