Home | Amazing | Today | Tags | Publishers | Years | Search 
Official Ubuntu Book, The (6th Edition)
Official Ubuntu Book, The (6th Edition)

AS WE WRITE THIS, it has been several years since we penned the first edition of The Official Ubuntu Book. Over that time, we have seen Ubuntu continue its explosive growth. Updating this book drives this fact home in striking ways. For example, the number of users and posts in the Ubuntu Forums has nearly doubled since the last...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

CMOS/BiCMOS ULSI: Low Voltage, Low Power (Prentice Hall Modern Semiconductor Design Series)
CMOS/BiCMOS ULSI: Low Voltage, Low Power (Prentice Hall Modern Semiconductor Design Series)

For upper level and graduate level Electrical and Computer Engineering courses in Integrated Circuit Design as well as professional circuit designers, engineers and researchers working in portable wireless communications hardware.This book presents the fundamentals of Complementary Metal Oxide Semiconductor (CMOS) and Bipolar compatible...

Machine Perception
Machine Perception

The field of machine perception concerns the building of machines that sense and interpret their environments. This book is about visual perception. Potential applications for such systems include tasks such as automation of industrial processes of inspection and assembly, automated medical x-ray diagnosis, vehicle guidance and...

Elements of ML Programming, ML97 Edition (2nd Edition)
Elements of ML Programming, ML97 Edition (2nd Edition)

I became interested in ML programming when I taught CS109, the introduc- tory Computer Science Foundations course at Stanford, starting in 1991. ML was used by several of the instructors of this course, including Stu Reges and Mike Cleron, to introduce concepts such as functional programming and type systems. It was also used for the...

SOA Governance: Governing Shared Services On-Premise and in the Cloud
SOA Governance: Governing Shared Services On-Premise and in the Cloud

The Definitive Guide to Governing Shared Services and SOA Projects

 SOA Governance: Governing Shared Services On-Premise and in the Cloud is the result of a multi-year project to collect proven industry practices for establishing IT governance controls specific to the adoption of SOA...

Project Management for Information Systems (5th Edition)
Project Management for Information Systems (5th Edition)

We are very pleased to present this fifth edition of Project Management for Information Systems. As with its predecessors, our ‘target audience’ fall into four groups:

  • IS project managers and systems developers who find themselves responsible for managing systems projects. Newcomers to this activity will find...
Compilers: Principles, Techniques, and Tools (2nd Edition)
Compilers: Principles, Techniques, and Tools (2nd Edition)

In the time since the 1986 edition of this book, the world of compiler design has changed significantly. Programming languages have evolved to present new compilation problems. Computer architectures offer a variety of resources of which the compiler designer must take advantage. Perhaps most interestingly, the venerable technology of...

Category Theory for Computing Science
Category Theory for Computing Science

This book is a textbook in basic category theory, written specifically to be read by researchers and students in computing science. We expound the constructions we feel are basic to category theory in the context of examples and applications to computing science. Some categorical ideas and constructions are already used heavily in computing...

Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
Computer Vision: A Modern Approach (2nd Edition)
Computer Vision: A Modern Approach (2nd Edition)

 

Computer vision as a field is an intellectual frontier. Like any frontier, it is exciting and disorganized, and there is often no reliable authority to appeal to. Many useful ideas have no theoretical grounding, and some theories are useless in practice; developed areas are widely scattered, and
...
Core HTML5 Canvas: Graphics, Animation, and Game Development (Core Series)
Core HTML5 Canvas: Graphics, Animation, and Game Development (Core Series)
In the summer of 2001, after 15 years of developing graphical user interfaces and graphics-intensive applications, I read a best-selling book about implementing web applications by someone I did not know—Jason Hunter—but whom, unbeknownst to me, would soon become a good friend on the No Fluff Just Stuff (NFJS) tour....
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy