Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Theory of Computing: A Gentle Introduction
Theory of Computing: A Gentle Introduction

The theory of computing provides students with a background in the fundamentals of computing with which to achieve a deeper understanding of contemporary computing systems. Computers are evolving and developing at a dizzying rate. Yet, the fundamentals of pattern matching and programming language design and implementation have remained...

Mastering Vim: Build a software development environment with Vim and Neovim
Mastering Vim: Build a software development environment with Vim and Neovim

Mastering Vim, reviewed by Bram Moolenaar, the creator of Vim, covers usage of Vim and Neovim, showcases relevant plugins, and teaches Vimscript

Key Features

  • Expert Vim and Vimscript techniques to work with Python and other development environment
  • Accomplish end-to-end...
Web Content Delivery
Web Content Delivery
The concept of content delivery has become increasingly more important due to rapidly growing demands for efficient distribution and fast access of information from the Internet. The content can be diverse and broad-ranging, and the desire to facilitate ubiquitous information access demands varied network architectures and hardware devices. The...
Security for Web Services and Service-Oriented Architectures
Security for Web Services and Service-Oriented Architectures

Web services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with...

Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Adaptation and Cross Layer Design in Wireless Networks (Adaptation in Wireless Communications)
Adaptation and Cross Layer Design in Wireless Networks (Adaptation in Wireless Communications)
Adaptive techniques play a key role in modern wireless communication systems. The concept of adaptation is emphasized in the Adaptation in Wireless Communications Series through a unified framework across all layers of the wireless protocol stack ranging from the physical layer to the application layer, and from cellular systems to...
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

Pervasive Computing and Networking
Pervasive Computing and Networking

This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networks

With the widespread availability of wireless and mobile networking technologies and the expected convergence of ubiquitous computing with these emerging technologies in the near future,...

Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Digital Music: Computers That Make Music (Digital World)
Digital Music: Computers That Make Music (Digital World)

Today there are talking toasters, cars that start themselves using voice recognition, and telephones that use voice commands. But those are not the only examples of digital sound. The ubiquitous earbuds and tiny MP3 players show how common it is to listen to digital music. Digital Music: Computers That Make Music examines digital sound's...

RF Microelectronics
RF Microelectronics

The Acclaimed RF Microelectronics Best-Seller, Expanded and Updated for the Newest Architectures, Circuits, and Devices Wireless communication has become almost as ubiquitous as electricity, but RF design continues to challenge engineers and researchers. In the 15 years since the first edition of this classic text, the demand for higher...

Design Literacy: Understanding Graphic Design
Design Literacy: Understanding Graphic Design
Author and design expert Steven Heller has revisited and revised the popular classic Design Literacy by revising many of the thoughtful essays from the original and mixing in thirty-two new works. Each essay offers a taste of the aesthetic, political, historical, and personal issues that have engaged designers from the late...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy