Raspberry Pi A Quick-Start Guide
Over the past decades computers have gotten cheaper and cheaper, so today
you can find them not only beneath your desk but in nearly every consumer
electronics device such as smartphones or DVD players. Still, computers
aren’t so cheap that you spontaneously buy one when shopping for your
groceries. Usually, you carefully... The Mathematics of Signal Processing (Cambridge Texts in Applied Mathematics)
Arising from courses taught by the authors, this largely self-contained treatment is ideal for mathematicians who are interested in applications or for students from applied fields who want to understand the mathematics behind their subject. Early chapters cover Fourier analysis, functional analysis, probability and linear algebra, all of...
Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.
If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,...
Modern Statistical Methods for Astronomy: With R Applications
Modern astronomical research is beset with a vast range of statistical challenges, ranging from reducing data from megadatasets to characterizing an amazing variety of variable celestial objects or testing astrophysical theory. Linking astronomy to the world of modern statistics, this volume is a unique resource, introducing astronomers to...
Stochastic Modeling and Analysis of Telecoms Networks
This book addresses the stochastic modeling of telecommunication networks, introducing the main mathematical tools for that purpose, such as Markov processes, real and spatial point processes and stochastic recursions, and presenting a wide list of results on stability, performances and comparison of systems.
The authors propose a...
Spring Security 3.1
Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to...
|Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next |