Account
Orders
Advanced search
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and...
Electronic Health Record: Standards, Coding Systems, Frameworks, and Infrastructures Discover HowElectronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery The increased role of IT in the healthcare sector has led to the coining of a new...
The book provides an overview of the most advanced quantum informational geometric techniques, which can help quantum communication theorists analyze quantum channels, such as security or additivity properties. Each section addresses an area of major research of quantum...
A holistic approach to service reliability and availability of cloud computing Reliability and Availability of Cloud Computing provides IS/IT system and solution architects, developers, and engineers with the knowledge needed to assess the impact of virtualization and...
Practical Database Programming with Visual Basic.NET The most up-to-date Visual Basic.NET programming textbook—covering both fundamentals and advanced-level programming techniques—complete with examples and solutions Visual Basic.NET (VB.NET) is an object-oriented...
The next enterprise computing era will rely on the synergy between both technologies: semantic web and model-driven software development (MDSD).The semantic web organizes system knowledge in conceptual domains according to its meaning. It addresses various enterprise...
There are many books on computers, networks, and software engineering but none that integrate the three with applications. Integration is important because, increasingly, software dominates the performance, reliability, maintainability, and availability of complex...
Poorly performing enterprise applications are the weakest links in a corporation's management chain, causing delays and disruptions of critical business functions. This groundbreaking book frames enterprise application performance engineering not as an art but as...
A timely text on the recent developments in data storage, from a materials perspective Ever-increasing amounts of data storage on hard disk have been made possible largely due to the immense technological advances in the field of data storage materials. Developments in...
While geographic redundancy can obviously be a huge benefit for disaster recovery, it is far less obvious what benefit is feasible and likely for more typical non-catastrophic hardware, software, and human failures. Georedundancy and Service Availability provides both a...
Just the math skills you need to excel in the study or practice of engineering Good math skills are indispensable for all engineers regardless of their specialty, yet only a relatively small portion of the math that engineering students study in college mathematics...
Covers fundamental and advanced Java database programming techniques for beginning and experienced readers This book covers the practical considerations and applications in database programming using Java NetBeans IDE, JavaServer Pages, JavaServer Faces, and Java...
This pocket guide provides an overview of the telecommunications environment as it has evolved over the past few years, illustrating the need for project management, the significance of project success to the companies, and the application of key project management...
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and...
System reliability, availability and robustness are often not well understood by system architects, engineers and developers. They often don't understand what drives customer's availability expectations, how to frame verifiable availability/robustness requirements, how...
A unique, integrative, team-centered approach to writing and formatting technical documents Technical Professionals: Do you have difficulty producing high-quality documents with multiple contributors when faced with a tight deadline? Do you need a process that...
Provides an introduction to modern object-oriented design principles and applications for the fast-growing area of modeling and simulation Covers the topic of multi-domain system modeling and design with applications that have components from several areas Serves as a...
Explains for the first time how "computing with words" can aid in making subjective judgments Lotfi Zadeh, the father of fuzzy logic, coined the phrase "computing with words" (CWW) to describe a methodology in which the objects of computation are words and propositions...
Presents the state of the technology and points to future directions for semantic computing Semantic computing, a rapidly evolving interdisciplinary field, seeks to structure, design, and manipulate computer content to better satisfy the needs and intentions of users...
A novel approach to developing and applying databases with Visual C#.NET Practical Database Programming with Visual C#.NET clearly explains the considerations and applications in database programming with Visual C#.NET 2008 and in developing relational databases such...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers