Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
The goal of this book is to teach computational scientists and engineers how to develop tailored, flexible, and efficient working environments built from small programs (scripts) written in the easy-to-learn, very high-level language Python. The focus is on examples and applications of relevance to computational science: gluing existing...
Applied Fuzzy Arithmetic: An Introduction with Engineering Applications
Applied Fuzzy Arithmetic: An Introduction with Engineering Applications

Applied Fuzzy Arithmetic provides a well-structured compendium that offers both a deeper knowledge about the theory of fuzzy arithmetic and an extensive view on its applications in the engineering sciences, making it a resource for students, researchers, and practical engineers. The first part of the book gives an introduction...

User's Guide To Cryptography And Standards (Artech House Computer Security)
User's Guide To Cryptography And Standards (Artech House Computer Security)
This book is about standards, cryptography, and standards for cryptography. It has been written in the hope that it will
serve a number of purposes, including the following.

◗ Perhaps most importantly, to provide a general introduction
to standardized cryptography for the user of this technology (i.e., a designer or
...
SQLite (Developer's Library)
SQLite (Developer's Library)

SQLite is a small, fast, embeddable database. What makes it popular is the combination of the database engine and interface into a single library as well as the ability to store all the data in a single file. Its functionality lies between MySQL and PostgreSQL, however it is faster than both databases.

In...

Handbook of Data Structures and Applications
Handbook of Data Structures and Applications

Handbook of Data Structures and Applications responds to the needs of data structure and algorithm researchers by providing a comprehensive survey of data structures of various types. Divided into seven parts, the text begins with a review of introductory material, followed by a discussion of well-know classes of data structures, Priority...

Malicious Cryptography: Exposing Cryptovirology
Malicious Cryptography: Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first...
Geographic Information Systems in Business
Geographic Information Systems in Business
This book contains state-of-the-art research studies on the concepts, theory, processes, and real world applications of geographical information systems (GIS) in business. Its chapters are authored by many of the leading experts in applying GIS and geospatial science to business. The book utilizes a wide variety of approaches and methodologies...
From P2P to Web Services and Grids: Peers in a Client/Server World
From P2P to Web Services and Grids: Peers in a Client/Server World

"From P2P to Web Services and Grids" provides a comprehensive overview of emerging distributed-systems technologies. It covers peer-to-peer (P2P) systems, which have revolutionized the way we think about distributed computing and the internet, alternative solutions, most notably web services and Grid computing, but...

The BIOS Companion: The book that doesn't come with your motherboard!
The BIOS Companion: The book that doesn't come with your motherboard!
The instructions that turn a PC into a useful machine come in three stages, starting with application programs, which are loaded by an operating system, which in turn is loaded by a bootstrap loader in the BIOS (the Basic Input/Output System). There are several in a PC, a good example being the one on the video card that controls the interface...
UML 2004 - The Unified Modeling Language: Modeling Languages and Applications. 7th International Conference
UML 2004 - The Unified Modeling Language: Modeling Languages and Applications. 7th International Conference

This book constitutes the refereed proceedings of the 7th International Conference on the Unified Modeling Language, UML 2004, held in Lisbon, Portugal, in October 2004.

The 30 revised full papers presented together with summaries on the workshops and tutorials were carefully reviewed and selected from 135 technical paper submissions....

Managing Corporate Information Systems Evolution and Maintenance
Managing Corporate Information Systems Evolution and Maintenance
Managing Corporate Information Systems Evolution and Maintenance addresses the recent developments of systems maintenance research and practices ranging from technicality of systems evolution to managerial aspects of the topic. It includes very contemporary issues such as evolving legacy systems to e-business, applying patterns for reengineering...
Secure Systems Development with UML
Secure Systems Development with UML
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.

Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML...

unlimited object storage image
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy