Account
Orders
Advanced search
Discover the benefits of applying algorithms to solve scientific, engineering, and practical problems Providing a combination of theory, algorithms, and simulations, Handbook of Applied Algorithms presents an all-encompassing treatment of applying algorithms and...
An interdisciplinary framework for learning methodologies—covering statistics, neural networks, and fuzzy logic, this book provides a unified treatment of the principles and methods for learning dependencies from data. It establishes a general conceptual framework in...
A self-contained text on modeling and performance evaluation of communication networks This quantitative book focuses on the real issues behind modeling and analysis of communication networks. The author covers a wide variety of topical networking subject matter based...
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA...
The central thesis ofThe Web's Awake is that the phenomenal growth and complexity of the web is beginning to outstrip our capability to control it directly. Many have worked on the concept of emergent properties within highly complex systems, concentrating heavily on...
As Internet traffic grows and demands for quality of service become stringent, researchers and engineers can turn to this go-to guide for tested and proven solutions. This text presents the latest developments in high performance switches and routers, coupled with...
A unique overview of network security issues, solutions, and methodologies at an architectural and research level Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, policy, and...
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States...
Understanding Information Transmission introduces you to the entire field of information technology. In this consumer handbook and introductory student resource, seven chapters span the gamut of the field—the nature, storage, transmission, networking, and protection of...
Concurrent and Distributed Computing in Java addresses fundamental concepts in concurrent computing with Java examples. The book consists of two parts. The first part deals with techniques for programming in shared-memory based systems. The book covers concepts in Java...
This is the first practical treatment of the design and application of feedback control of computing systems. MATLAB files for the solution of problems and case studies accompany the text throughout. The book discusses information technology examples, such as maximizing...
Provides comprehensive treatment of the theory of both static and dynamic neural networks. * Theoretical concepts are illustrated by reference to practical examples Includes end-of-chapter exercises and end-of-chapter exercises. *An Instructor Support FTP site is...
Provides a comprehensive, detailed description of the fundamental architectural principles and protocols used in ATM-based networks, as well as interworking with IP and Frame Relay based networks Begins with general coverage of ATM, but moves quickly into the most...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers