Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Simulation Methods in Theoretical Physics
Computer Simulation Methods in Theoretical Physics

The new and exciting field of computational science, and in particular sim- ulational science, has seen rapid change since the first edition of this book came out. New methods have been found, fresh points of view have emerged, and features hidden so far have been uncovered. Almost all the methods presented in the first addition have...

Element Stamp Algorithm for Matrix Formulation of Symbolic Circuits (Computer Networks)
Element Stamp Algorithm for Matrix Formulation of Symbolic Circuits (Computer Networks)
The need to analyze a linear network is a recurring requirement in computer-aided network analysis. Not only a majority of the network problems to be solved is posed as linear problems; nonlinear resistive and dynamic networks are usually solved by the analysis of a sequence of “linearized” networks. The analysis of...
Create Your Own Hedge Fund: Increase Profits and Reduce Risks with ETFs and Options (Wiley Trading)
Create Your Own Hedge Fund: Increase Profits and Reduce Risks with ETFs and Options (Wiley Trading)

"Options writing made simple for the layman."
—James Altucher, author of Trade Like a Hedge Fund

"One of the clearest explanations of how to use options as they were originally intended: as a component of an overall strategy in conjunction with other positions."
—Robert V. Green,
...

The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself
Don't Blame the Shorts: Why Short Sellers Are Always Blamed for Market Crashes and How History Is Repeating Itself

"Sloan's easy and informative writing makes for a thoroughly worthwhile update."--BARRON’S

"A useful corrective to the view of short selling as 'unpatriotic' or uniquely anti-social."--John Plender, Financial Times, November 16, 2009

"I liked this...

France (Rough Guides)
France (Rough Guides)

The Rough Guide to France is your definitive handbook to one of Europe''s most beautiful countries. From Bastille Day celebrations and the spectacular Amiens cathedral to wintersports in the Alps and the famous Tour de France, this guide captures all of France''s highlights in a full colour introduction. The top hotels, bars...

Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples,...
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Hacker Web Exploitation Uncovered
Hacker Web Exploitation Uncovered

Written from both from the attacker's and security specialist's perspective, this thorough guide uncovers how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.

A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is...

Hacker Linux Uncovered
Hacker Linux Uncovered
Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log...
Mobile Telemedicine: A Computing and Networking Perspective
Mobile Telemedicine: A Computing and Networking Perspective
Wireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has...
Autism Spectrum Disorders: Identification, Education, and Treatment
Autism Spectrum Disorders: Identification, Education, and Treatment
The field of autism has been growing at an unprecedented rate in recent years. In addition to an actual rise in the number of classic DSM-IV cases, broadened diagnostic criteria have uncovered a wider range of autistic behaviors and ability levels. The third edition of this well-known text continues the mission of its predecessors--to present a...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy