Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Quantum Information And Computing (Quantum Probability and White Noise Analysis)
Quantum Information And Computing (Quantum Probability and White Noise Analysis)
This volume constitutes the proceedings of the international conference on "Quantum Information 2003" held in Tokyo University of Science/Tokyo (Japan) from 1 to 3 November 2003, in International Institute for Advanced Studies/Kyoto (Japan) from 5 to 7 November 2003, in University of Waseda/Tokyo (Japan) from 29 to 31 October 2003, in...
Algorithms and Data Structures: The Basic Toolbox
Algorithms and Data Structures: The Basic Toolbox
Algorithms are at the heart of every nontrivial computer application, and algorithmics is a modern and active area of computer science. Every computer scientist and every professional programmer should know about the basic algorithmic toolbox: structures that allow efficient organization and retrieval of data, frequently used algorithms, and basic...
Physical Science Experiments (Facts on File Science Experiments)
Physical Science Experiments (Facts on File Science Experiments)

Physical science and chemistry are two different but closely related fields, and they are also two of the primary areas of physical science. Physics encompasses the study of the world's foundations - from the tiniest particles to the framework of the universe. Chemistry focuses more on the properties of matter and how individual atoms and...

Einstein Relatively Simple: Our Universe Revealed
Einstein Relatively Simple: Our Universe Revealed

Einstein Relatively Simple brings together for the first time an exceptionally clear explanation of both special and general relativity. It is for people who always wanted to understand Einstein's ideas but never thought they could.

Told with humor, enthusiasm, and rare clarity, this entertaining book reveals how a former high...

Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

Pervasive Information Architecture: Designing Cross-Channel User Experiences
Pervasive Information Architecture: Designing Cross-Channel User Experiences

I knew the Internet before it got famous. There were places but no paths, no maps, no search engines. Entry required a key in the form of an IP address and an incantation in the language of UNIX. It was a small world that felt big because it was so easy to get lost in the shadowy realm of texts and data, completely devoid of color....

TIBCO Architecture Fundamentals (TIBCO Press)
TIBCO Architecture Fundamentals (TIBCO Press)

TIBCO’s product suite comprises a diverse range of components. Each component is specialized for a particular functionality, ranging from basic messaging through services, service orchestration, the management of complex business processes, managing master data across...

Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Photoshop CS5 For Dummies
Photoshop CS5 For Dummies

The bestselling guide to the leading image-editing software, fully updated

Previous editions of this For Dummies guide have sold more 650,000 copies. Richly illustrated in full color, this edition covers all the updates in the newest version of Photoshop, the gold standard for image-editing programs. Used by...

Mastering SVG: Ace web animations, visualizations, and vector graphics with HTML, CSS, and JavaScript
Mastering SVG: Ace web animations, visualizations, and vector graphics with HTML, CSS, and JavaScript

Take the plunge and develop cross-browser-compatible and responsive web designs with SVG

Key Features

  • Master the art of custom animations and visualizations with SVG, CSS, and JavaScript
  • Combine SVG with third-party libraries and frameworks such as React, JQuery, D3, and...
Machine Learning with the Raspberry Pi: Experiments with Data and Computer Vision (Technology in Action)
Machine Learning with the Raspberry Pi: Experiments with Data and Computer Vision (Technology in Action)

Using the Pi Camera and a Raspberry Pi board, expand and replicate interesting machine learning (ML) experiments.  This book provides a solid overview of ML and a myriad of underlying topics to further explore. Non-technical discussions temper complex technical explanations to make the hottest and most complex topic in the...

Result Page: 934 933 932 931 930 929 928 927 926 925 924 923 922 921 920 919 918 917 916 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy