Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Simply Scheme: Introducing Computer Science
Simply Scheme: Introducing Computer Science

An introductory-level text for students who are not majoring in computer science as well as for computer science majors with no prior programming experience, Simply Scheme teaches computer science from a functional/symbolic point of view. It provides a solid platform from which students can go on to study the seminal work Structure and...

Foundations of Dependable Computing: Paradigms for Dependable Applications
Foundations of Dependable Computing: Paradigms for Dependable Applications
Foundations of Dependable Computing: Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level. Driven by the higher level fault models of Models and Frameworks for Dependable Systems, and built on the lower level abstractions implemented in a third companion book...
Control Engineering: A Modern Approach
Control Engineering: A Modern Approach

An exciting new text for the advanced controls course, Control Engineering: A Modern Approach breaks with tradition by introducing a number of new topics--robust controls, for example--and omitting a number of topics dated by the use of digital computers. Bélanger gives the student a real introduction to control engineering...

Software by Design: Shaping Technology and The Workplace
Software by Design: Shaping Technology and The Workplace
As computers become more and more integral to business and other organizational operations around the world, software design must increasingly meet the social demands of the workplace. This book provides an informative, cogent examination of how various social factors--such as organizational structure, workplace relations, and market...
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and...
E: The Story of a Number
E: The Story of a Number
Maor attempts to give the irrational number e its rightful standing alongside pi as a fundamental constant in science and nature; he succeeds very well.... Maor writes so that both mathematical newcomers and long-time professionals alike can thoroughly enjoy his book, learn something new, and witness the ubiquity of mathematical ideas in...
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and...
Absolute Beginner's Guide to C (2nd Edition)
Absolute Beginner's Guide to C (2nd Edition)

For beginning programmers, this updated edition answers all C programming questions. This bestseller talks to readers at their level, explaining every aspect of how to get started and learn the C language quickly. Readers also find out where to learn more about C. This book includes tear-out reference card of C functions and statements, a...

An Extended Entity-Relationship Model: Fundamentals and Pragmatics (Lecture Notes in Computer Science)
An Extended Entity-Relationship Model: Fundamentals and Pragmatics (Lecture Notes in Computer Science)
Studying modern database languages one recognizes that there is a gap between language features and theoretical foundations:

* Studies of the formal foundations exist for the relational data model but not for the Entity-Relationship model, which is a model used by numerous practical people. Also, most extensions of
...
Making TeX Work (A Nutshell handbook)
Making TeX Work (A Nutshell handbook)

TeX is a powerful tool for creating professional quality typeset text and is unsurpassed at typesetting mathematical equations, scientific text, and multiple languages. Many books describe how you use TeX to construct sentences, paragraphs, and chapters. Until now, no book has described all the software that actually lets you build,...

Ultimate Journey
Ultimate Journey

In 1958, a successful businessman named Robert Mornroe began to have experiences that drastically altered his life.  Unpredictably, and without his willing it, Monroe found himself leaving his physical body to travel via a "second body" to locales far removed from the physical and spiritual realities of his life. He was...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy