|
|
|
|
Introduction to Scientific Computing: A Matrix Vector Approach Using MATLAB
This book presents a unique approach for one semester numerical methods and numerical analysis courses. Well organized but flexible, the text is brief and clear enough for introductory numerical analysis students to "get their feet wet," yet comprehensive enough in its treatment of problems and applications for higher-level students to... | | AdvancED Flash Interface Design (Advanced Design)As a competent Flash designer, youre probably comfortable with all of the basics that Flash has to offer. However, youve probably looked at some of the amazing Flash sites on the web and thought, "How'd they do that?" Well, youll find out in this book. Flash allows users to create some amazing interactive interfaces to interact with Rich... | | E-Mail Security: A Pocket Guide
E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,... |
|
| | High Performance Computing on Vector Systems 2007The book presents the state-of-the-art in high performance computing and simulation on modern supercomputer architectures. It covers trends in hardware and software development in general and specifically the future of vector-based systems and heterogeneous architectures. The application contributions cover computational fluid dynamics,... | | Color Image Processing: Methods and ApplicationsOver the last two decades, we have witnessed an explosive growth in both the diversity of techniques and the range of applications of image processing. However, the area of color image processing is still sporadically covered, despite having become commonplace, with consumers choosing the convenience of color imaging over traditional grayscale... |
|
|
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this... | | Combating Spyware in the EnterpriseSpyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain... | | Applying Computational Intelligence: How to Create ValueThe flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines... |
|
|
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 |