Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Probability with Statistical Applications
Introduction to Probability with Statistical Applications
This book provides a calculus-based introduction to probability and statistics. It contains enough material for two semesters but, with judicious selection, it can be used as a textbook for a one-semester course, either in probability and statistics or in probability alone.

Each section contains many examples and exercises and, in the
...
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information....
Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
Social Simulation: Technologies, Advances and New Discoveries (Premier Reference)
The simulation of social behavior in a variety of domains is an increasingly important technological tool.

eference survey of social simulation work, Social Simulation: Technologies, Advances and New Discoveries comprehensively collects the most exciting developments in the field. Drawing research contributions from a vibrant...

A Practical Guide to Data Structures and Algorithms using Java
A Practical Guide to Data Structures and Algorithms using Java

Although traditional texts present isolated algorithms and data structures, they do not provide a unifying structure and offer little guidance on how to appropriately select among them. Furthermore, these texts furnish little, if any, source code and leave many of the more difficult aspects of the implementation as exercises. A fresh...

Emerging Technologies in Surgery
Emerging Technologies in Surgery
Tremendous acceleration and changes in our daily medical practice are occurring. Both as doctors and ordinary citizens, we are aware of living in a world more and more inuenced by information technology. In surgery, this revolution has brought about a dramatic acceleration of the introduction of new devices,...
ASP.NET AJAX in Action
ASP.NET AJAX in Action
Ajax has revolutionized the way users interact with web pages today. Gone are frustrating page refreshes, lost scroll positions and intermittent interaction with a web site. Instead, we have a new generation of fast, rich, and more intuitive web applications. The ASP.NET AJAX framework puts the power of Ajax into the hands of web developers....
End-to-End Network Security: Defense-in-Depth
End-to-End Network Security: Defense-in-Depth
The network security lifecycle requires specialized support and a commitment to best practice standards. In this book, you will learn best practices that draw upon disciplined processes, frameworks, expert advice, and proven technologies that will help you protect your infrastructure and organization. You will learn end-to-end security best...
SOA in Practice: The Art of Distributed System Design (Theory in Practice)
SOA in Practice: The Art of Distributed System Design (Theory in Practice)
This book demonstrates service-oriented architecture (SOA) as a concrete discipline rather than a hopeful collection of cloud charts. Built upon the author's firsthand experience rolling out a SOA at a major corporation, SOA in Practice explains how SOA can simplify the creation and maintenance of large-scale applications. Whether your...
Beginning PHP and Oracle: From Novice to Professional (Expert's Voice)
Beginning PHP and Oracle: From Novice to Professional (Expert's Voice)
Beginning PHP and Oracle: From Novice to Professional offers comprehensive information on using the PHP scripting language in conjunction with Oracle's database platform. PHP is one of the most prominent open source technologies in the area of web development, while Oracle is one of the most widely deployed and used database products....
Symbian OS C++ for Mobile Phones (Symbian Press)
Symbian OS C++ for Mobile Phones (Symbian Press)
Richard Harrison’s existing books are the bestsellers in the Symbian Press Portfolio.В  His latest book, co-written with Mark Shackman is the successor to "Symbian OS C++ for Mobile Phones" Volumes One and Two. Written in the same style as the two previous volumes, this is set to be another gem in the series.В 

...

Designing Embedded Processors: A Low Power Perspective
Designing Embedded Processors: A Low Power Perspective
As we embrace the world of personal, portable, and perplexingly complex digital systems, it has befallen upon the bewildered designer to take advantage of the available transistors to produce a system which is small, fast, cheap and correct, yet possesses increased functionality.

Increasingly, these systems have to consume little energy....

Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
Result Page: Previous 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy