Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Compiler Design Handbook: Optimizations & Machine Code Generation
The Compiler Design Handbook: Optimizations & Machine Code Generation

In the last few years, changes have had a profound influence on the problems addressed by compiler designers. First, the proliferation in machine architectures has necessitated the fine-tuning of compiler back ends to exploit features such as multiple memory banks, pipelines and clustered architectures. These features provide potential for...

Mathematical Logic (Dover Books on Mathematics)
Mathematical Logic (Dover Books on Mathematics)
After the appearance in 1952 of my "Introduction to Metamathematics", written for students at the first-year graduate level, I had no expectation of writing another text. But various occasions arose which required me to think about how to present parts of the same material more briefly, to a more...
Light Years and Time Travel: An Exploration of Mankind's Enduring Fascination With Light
Light Years and Time Travel: An Exploration of Mankind's Enduring Fascination With Light
According to Einstein, nothing can travel faster than the speed of light. Of all the mind-bending theories in modern physics, that, at least, seemed a rule the universe–let alone mankind–could never break.

But in 1994 Professor Gunter Nimtz sent a recording of Mozart’s 40th Symphony through a physical barrier at four times...

Network Security Essentials (2nd Edition)
Network Security Essentials (2nd Edition)
This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of cryptography—covering algorithms and protocols...
Writing from Start to Finish: A Six-Step Guide
Writing from Start to Finish: A Six-Step Guide
"Can help you knock out writers block" -- Boston Herald

Ideal for writing a short story, essay, review, or report, this guide provides beginning writers with the hands-on direction they need to improve their writing techniques and ability. Using a six-step approach to writing, this resource covers
...
The Application of Programmable DSPs in Mobile Communications
The Application of Programmable DSPs in Mobile Communications
This book is about two technologies that have had, and will increasingly have, a significant impact on the way we all live, learn and play: personal wireless communications and signal processing. When it comes to both markets, history has shown that reality has often surprised the most optimistic forecasters.

We draw on the experience of
...
Mastering Network Security
Mastering Network Security
The new edition of the highly-acclaimed and best-selling Mastering Network Security is here, and just in time! The past four significant Internet worm attacks alone have cost companies more than $10 billion in repairs and lost productivity. And as hackers continue to discover new ways to exploit vulnerable networks, the need for up-to-date security...
The Circuits and Filters Handbook, Second Edition (Five Volume Slipcase Set) (Electrical Engineering Handbook)
The Circuits and Filters Handbook, Second Edition (Five Volume Slipcase Set) (Electrical Engineering Handbook)

A bestseller in its first edition, The Circuits and Filters Handbook has been thoroughly updated to provide the most current, most comprehensive information available in both the classical and emerging fields of circuits and filters, both analog and digital. This edition contains 29 new chapters, with significant additions in the areas of...

Number Theory for Computing
Number Theory for Computing
There are many surprising connections between the theory of numbers, which is one of the oldest branches of mathematics, and computing and information theory. Number theory has important applications in computer organization and security, coding and cryptography, random number generation, hash functions, and graphics. Conversely, number theorists...
Cryptography Demystified
Cryptography Demystified

Works through 35 cryptography modules supported by exercises and answers

This first part comprises thirteen modules. These modules will  familiarize you with some of the important terms and concepts of  cryptography in general and symmetric of one-key cryptography in specific. Symmetric cryptography is the
...
Introduction to Constraint Databases
Introduction to Constraint Databases
Constraint databases provide extra expressive power over relational databases in a largely hidden way at the data-storage or physical level. Constraints, such as linear or polynomial equations, are used to represent large sets in a compact manner. They keep the view of the database for a user or application programmer almost as simple as in...
Microsoft Windows 2000 Scripting Guide
Microsoft Windows 2000 Scripting Guide

Welcome to the Microsoft® Windows® 2000 Scripting Guide.

As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a...

Result Page: Previous 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy