|
|
|
|
| | Linux Network Servers (Craig Hunt Linux Library)Authoritative Answers to All Your Linux Network Server Questions—Specifically for Linux Administrators Tap into Linux's impressive capabilities as a network server. Written by one of the world’s leading Linux system administration experts, Linux Network Servers teaches you,... | | |
|
Signal Processing and Linear SystemsThis text presents a comprehensive treatment of signal processing and linear systems suitable for juniors and seniors in electrical engineering. Based on B. P. Lathi's widely used book, Linear Systems and Signals, it features additional applications to communications, controls, and filtering as well as new chapters on analog and digital filters and... | | eLearning and Digital Publishing (Computer Supported Cooperative Work)Our universities are facing immense pressures from within because of the increase in the ‘publish or perish’ syndrome. There are severe budgetary demands on university libraries attempting to enable access to this increasing avalanche of information. University teaching also needs to prepare graduates for a rapidly changing and... | | Information Theory and Reliable CommunicationThis book is designed primarily for use as a first-year graduate text in information theory, suitable for both engineers and mathematicians. It is assumed that the reader has some understanding of freshman calculus and elementary probability, and in the later chapters some introductory random process theory. Unfortunately there is one more... |
|
Methods of Historical Analysis in Electronic Media (Lea's Communication Series)Methods of Historical Analysis in Electronic Media provides a foundation for historical research in electronic media by addressing the literature and the methods—traditional and the eclectic methods of scholarship as applied to electronic media. It is about history—broadcast electronic media history and history that has been broadcast,... | | Handbook of Computer Crime Investigation: Forensic Tools & TechnologyComputers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital... | | |
|
|
|
Result Page: 574 573 572 571 570 569 568 567 566 565 564 563 562 561 560 559 558 557 556 |