Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastery: The Keys to Success and Long-Term Fulfillment
Mastery: The Keys to Success and Long-Term Fulfillment
Drawing on Zen philosophy and his expertise in the martial art of aikido, bestselling author George Leonard shows how the process of mastery can help us attain a higher level of excellence and a deeper sense of satisfaction and fulfillment in our daily lives. Whether you’re seeking to improve your career or your intimate relationships,...
Common-Sense C: Advice and Warnings for C and C++ Programmers
Common-Sense C: Advice and Warnings for C and C++ Programmers
C is a powerful programming language, but not without risks. Without help, even experienced C programmers can find themselves in trouble, despite "careful" programming, lint filters and good debuggers. And managers of programming projects can discover too late that using C carelessly can lead to delayed and defect-ridden software. This...
Mathematics of Classical and Quantum Physics
Mathematics of Classical and Quantum Physics
This book is designed as a companion to the graduate level physics texts on classical mechanics, electricity, magnetism, and quantum mechanics. It grows out of a course given at Columbia University and taken by virtually all first year graduate students as a fourth basic course, thereby eliminating the need to cover this mathematical material in a...
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany

The "European Institute for System Security (E.I.S.S.)" was founded on February 29, 1988 by cabinet resolution of the state government Baden-Wurttemberg. It is headed by Professor Thomas Beth and is affiliated with the Institute for Algorithms and Cognitive Systems (IAKS) of the Faculty for Computer Science at the University of...

UNIX(R) System Security: A Guide for Users and System Administrators
UNIX(R) System Security: A Guide for Users and System Administrators

Many of the same features that have attracted the corporate and government world to UNIX have made security very difficult to control. This book examines several high-profile security break-ins, and then provides the information necessary to protect a UNIX system from unauthorized access. Covers all the most recent releases of UNIX.

...
Modern Operating Systems
Modern Operating Systems
For software development professionals and computer science students, Modern Operating Systems gives a solid conceptual overview of operating system design, including detailed case studies of Unix/Linux and Windows 2000.

What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand...

Usability: Turning Technologies into Tools
Usability: Turning Technologies into Tools
"The book contains much insight." --B. Hazeltine, Computing Reviews

"Unusual in that the research it brings together spans the perspectives of cognitive psychology, the sociology of work and technology, work-oriented systems design, computer-supported cooperative work, and human-computer interaction. Although most of
...
Memory Management: International Workshop IWMM 92, St.Malo, France, September 17 - 19, 1992. Proceedings
Memory Management: International Workshop IWMM 92, St.Malo, France, September 17 - 19, 1992. Proceedings
This is the first book entirely dedicated to the problem of memory management in programming language implementation. Its originality stems from the diversity of languages and approaches presented: functional programming, logic programming, object oriented programming, and parallel and sequential programming. The book...
Introduction to Artificial Neural Systems
Introduction to Artificial Neural Systems
The recent resurgence of interest in neural networks has its roots in the recognition that the brain performs computations in a different manner than do conventional digital computers. Computers are extremely fast and precise at executing sequences of instructions that have been formulated for them. A human information processing system is composed...
Hybrid Architectures for Intelligent Systems
Hybrid Architectures for Intelligent Systems

The interaction between Fuzzy Set theory and Neural Network theory is multi-faceted and occurs at many different levels. The connection between these two concepts occurs both in the framework of real and artificial neural systems.

The brain is not just a collection of neurons grouped together at some part of the animal’s body,...

Encyclopedia of World Cultures: Europe (Encyclopedia of World Cultures)
Encyclopedia of World Cultures: Europe (Encyclopedia of World Cultures)
Europe is in tremendous flux. Political boundaries and designations are changing with dizzying speed. Population mobility is altering the human landscape in astonishing and unpredictable ways. To publish this volume on European cultures at this particular historical juncture provides both a wonderful opportunity to offer a much-needed resource to...
Method of Discrete Vortices
Method of Discrete Vortices
The present book provides an effective direct method of the numerical solution of singular integral equations for both one and two (or more) dimensions and includes multiple integrals, especiaIly as applied to separated and vortex flows in aerodynamics. The authors of the book are a professional mathematician (Ivan Lifanov) and a numerical...
Result Page: 1 2 3 4 5 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy