Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
An Introduction to Quantum Computing Algorithms
An Introduction to Quantum Computing Algorithms
In 1994 Peter Shor [65] published a factoring algorithm for a quantum computer that finds the prime factors of a composite integer N more efficiently than is possible with the known algorithms for a classical com­ puter. Since the difficulty of the factoring problem is crucial for the se­ curity of a public key encryption system,...
Swarm Intelligence (The Morgan Kaufmann Series in Evolutionary Computation)
Swarm Intelligence (The Morgan Kaufmann Series in Evolutionary Computation)

Traditional methods for creating intelligent computational systems have privileged private "internal" cognitive and computational processes. In contrast, Swarm Intelligence argues that human intelligence derives from the interactions of individuals in a social world and further, that this model of...

Principles of Data Mining (Adaptive Computation and Machine Learning)
Principles of Data Mining (Adaptive Computation and Machine Learning)

The growing interest in data mining is motivated by a common problem across disciplines: how does one store, access, model, and ultimately describe and understand very large data sets? Historically, different aspects of data mining have been addressed independently by different disciplines. This is the first truly...

DNS and BIND, Fourth Edition
DNS and BIND, Fourth Edition
The fourth edition of DNS and BIND covers the new 9.1.0 and 8.2.3 versions of BIND as well as the older 4.9 version. There's also more extensive coverage of NOTIFY, IPv6 forward and reverse mapping, transaction signatures, and the new DNS Security Extensions; and a section on accommodating Windows 2000 clients,...
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
"He has written an excellent book that belongs in your personal library." Cryptologia

"Churchhouse (emer., Cardiff Univ., Wales) offers a history and explanation of codes, ciphers, cryptography, and cryptanalysis from Julius Caesar and WWII code-breaking activities to the present day including the world of the Internet.
...
E=mc2: A Biography of the World's Most Famous Equation
E=mc2: A Biography of the World's Most Famous Equation

Already climbing the bestseller lists-and garnering rave reviews-this "little masterpiece"* sheds brilliant light on the equation that changed the world.

"This is not a physics book. It is a history of where the equation [E=mc2] came from and how it has changed the world. After a short chapter on the
...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Mathematical Methods in Image Reconstruction (Monographs on Mathematical Modeling and Computation)
Mathematical Methods in Image Reconstruction (Monographs on Mathematical Modeling and Computation)

Since the advent of computerized tomography in radiology, many imaging techniques have been introduced in medicine, science, and technology. This book describes the state of the art of the mathematical theory and numerical analysis of imaging. The authors survey and provide a unified view of imaging techniques, provide the necessary...

The Data Model Resource Book, Vol. 1: A Library of Universal Data Models for All Enterprises
The Data Model Resource Book, Vol. 1: A Library of Universal Data Models for All Enterprises
"These books are a must for any company implementing data models. They contain practical insights and templates of universal data models which can be used by all enterprises, regardless of their level of experience."–Ron Powell, Publisher, DM Review

Industry experts raved about The Data Model Resource Book when it first came...

The Lady Tasting Tea: How Statistics Revolutionized Science in the Twentieth Century
The Lady Tasting Tea: How Statistics Revolutionized Science in the Twentieth Century
Science is inextricably linked with mathematics. Statistician David Salsburg examines the development of ever-more-powerful statistical methods for determining scientific truth in The Lady Tasting Tea, a series of historical and biographical sketches that illuminate without alienating the mathematically timid. Salsburg, who has worked...
Real-Resumes for Computer Jobs (Real-Resumes Series)
Real-Resumes for Computer Jobs (Real-Resumes Series)
Every resume and cover letter in this book actually worked. And most of the resumes and cover letters have common features: all are one-page, all are in the chronological format, and all resumes are accompanied by a companion cover letter. The book is divided into three parts. Part One provides some advice about job hunting. Step...
Computational Fluid Mechanics
Computational Fluid Mechanics

This volume presents recent advances in computational fluid dynamics. The topics range from fundamentals and computational techniques to a wide variety of applications in astronomy, applied mathematics and meteorology. They describe recent calculations in direct numerical simulation of turbulence, applications of turbulence modelling of...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy