bannerbanner

программирование

IPv6 Deployment and Management
4
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 – the latest IP version – has grown substantially. This book describes IPv6 technology and its repercussions on organizations, including…
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 – the latest IP version – has grown substantially. This book describes IPv6 technology and its repercussions on organizations, including…
Lean Architecture. for Agile Software Development
5
More and more Agile projects are seeking architectural roots as they struggle with complexity and scale – and they're seeking lightweight ways to do it Still seeking? In this book the authors help you to find your own path Taking cues from Lean devel…
More and more Agile projects are seeking architectural roots as they struggle with complexity and scale – and they're seeking lightweight ways to do it Still seeking? In this book the authors help you to find your own path Taking cues from Lean devel…
Harnessing Green IT. Principles and Practices
3
“Ultimately, this is a remarkable book, a practical testimonial, and a comprehensive bibliography rolled into one. It is a single, bright sword cut across the various murky green IT topics. And if my mistakes and lessons learned through the green IT …
“Ultimately, this is a remarkable book, a practical testimonial, and a comprehensive bibliography rolled into one. It is a single, bright sword cut across the various murky green IT topics. And if my mistakes and lessons learned through the green IT …
Computer Architecture and Security. Fundamentals of Designing Secure Computer Systems
3
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system s…
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system s…
Codecharts. Roadmaps and blueprints for object-oriented programs
4
NEW LANGUAGE VISUALIZES PROGRAM ABSTRACTIONS CLEARLY AND PRECISELY Popular software modelling notations visualize implementation minutiae but fail to scale, to capture design abstractions, and to deliver effective tool support. Tailored to overcome t…
NEW LANGUAGE VISUALIZES PROGRAM ABSTRACTIONS CLEARLY AND PRECISELY Popular software modelling notations visualize implementation minutiae but fail to scale, to capture design abstractions, and to deliver effective tool support. Tailored to overcome t…
Mathematics of Bioinformatics. Theory, Methods and Applications
5
Mathematics of Bioinformatics: Theory, Methods, and Applications provides a comprehensive format for connecting and integrating information derived from mathematical methods and applying it to the understanding of biological sequences, structures, an…
Mathematics of Bioinformatics: Theory, Methods, and Applications provides a comprehensive format for connecting and integrating information derived from mathematical methods and applying it to the understanding of biological sequences, structures, an…
Reconciliation of Geometry and Perception in Radiation Physics
5
Reconciliation of Geometry and Perception in Radiation Physics approaches the topic of projective geometry as it applies to radiation physics and attempts to negate its negative reputation. With an original outlook and transversal approach, the book …
Reconciliation of Geometry and Perception in Radiation Physics approaches the topic of projective geometry as it applies to radiation physics and attempts to negate its negative reputation. With an original outlook and transversal approach, the book …
Software Evolution and Maintenance
4
Provides students and engineers with the fundamental developments and common practices of software evolution and maintenance Software Evolution and Maintenance: A Practitioner’s Approach introduces readers to a set of well-rounded educational materia…
Provides students and engineers with the fundamental developments and common practices of software evolution and maintenance Software Evolution and Maintenance: A Practitioner’s Approach introduces readers to a set of well-rounded educational materia…
Formal Methods for Industrial Critical Systems. A Survey of Applications
5
Today, formal methods are widely recognized as an essential step in the design process of industrial safety-critical systems. In its more general definition, the term formal methods encompasses all notations having a precise mathematical semantics, t…
Today, formal methods are widely recognized as an essential step in the design process of industrial safety-critical systems. In its more general definition, the term formal methods encompasses all notations having a precise mathematical semantics, t…
Bistatic SAR / ISAR / FSR. Theory Algorithms and Program Implementation
5
Bistatic radar consists of a radar system which comprises a transmitter and receiver which are separated by a distance comparable to the expected target distance. This book provides a general theoretical description of such bistatic technology in the…
Bistatic radar consists of a radar system which comprises a transmitter and receiver which are separated by a distance comparable to the expected target distance. This book provides a general theoretical description of such bistatic technology in the…
Technical Writing for Teams. The STREAM Tools Handbook
5
A unique, integrative, team-centered approach to writing and formatting technical documents Technical Professionals: Do you have difficulty producing high-quality documents with multiple contributors when faced with a tight deadline? Do you need a pr…
A unique, integrative, team-centered approach to writing and formatting technical documents Technical Professionals: Do you have difficulty producing high-quality documents with multiple contributors when faced with a tight deadline? Do you need a pr…
Software Technology. 10 Years of Innovation in IEEE Computer
4
A comprehensive collection of influential articles from one of IEEE Computer magazine’s most popular columns This book is a compendium of extended and revised publications that have appeared in the “Software Technologies” column of IEEE Computer maga…
A comprehensive collection of influential articles from one of IEEE Computer magazine’s most popular columns This book is a compendium of extended and revised publications that have appeared in the “Software Technologies” column of IEEE Computer maga…
Constraint Networks. Targeting Simplicity for Techniques and Algorithms
5
A major challenge in constraint programming is to develop efficient generic approaches to solve instances of the constraint satisfaction problem (CSP). With this aim in mind, this book provides an accessible synthesis of the author's research and wor…
A major challenge in constraint programming is to develop efficient generic approaches to solve instances of the constraint satisfaction problem (CSP). With this aim in mind, this book provides an accessible synthesis of the author's research and wor…
Quantum Physics for Scientists and Technologists. Fundamental Principles and Applications for Biologists, Chemists, Computer Scientists, and Nanotechnologists
5
Quantum Physics for Scientists and Technologists is a self-contained, comprehensive review of this complex branch of science. The book demystifies difficult concepts and views the subject through non-physics fields such as computer science, biology, …
Quantum Physics for Scientists and Technologists is a self-contained, comprehensive review of this complex branch of science. The book demystifies difficult concepts and views the subject through non-physics fields such as computer science, biology, …
Architectures for Computer Vision. From Algorithm to Chip with Verilog
3
This book provides comprehensive coverage of 3D vision systems, from vision models and state-of-the-art algorithms to their hardware architectures for implementation on DSPs, FPGA and ASIC chips, and GPUs. It aims to fill the gaps between computer vi…
This book provides comprehensive coverage of 3D vision systems, from vision models and state-of-the-art algorithms to their hardware architectures for implementation on DSPs, FPGA and ASIC chips, and GPUs. It aims to fill the gaps between computer vi…
System Design for Telecommunication Gateways
3
System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware designs and software methods available on the market. Focusing on high-end efficient designs that ch…
System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware designs and software methods available on the market. Focusing on high-end efficient designs that ch…
Safety of Computer Architectures
3
It is currently quite easy for students or designers/engineers to find very general books on the various aspects of safety, reliability and dependability of computer system architectures, and partial treatments of the elements that comprise an effect…
It is currently quite easy for students or designers/engineers to find very general books on the various aspects of safety, reliability and dependability of computer system architectures, and partial treatments of the elements that comprise an effect…
Building Dependable Distributed Systems
5
This book covers the most essential techniques for designing and building dependable distributed systems. Instead of covering a broad range of research works for each dependability strategy, the book focuses only a selected few (usually the most semi…
This book covers the most essential techniques for designing and building dependable distributed systems. Instead of covering a broad range of research works for each dependability strategy, the book focuses only a selected few (usually the most semi…
Quantum Networking
3
Quantum networks build on entanglement and quantum measurement to achieve tasks that are beyond the reach of classical systems. Using quantum effects, we can detect the presence of eavesdroppers, raise the sensitivity of scientific instruments such a…
Quantum networks build on entanglement and quantum measurement to achieve tasks that are beyond the reach of classical systems. Using quantum effects, we can detect the presence of eavesdroppers, raise the sensitivity of scientific instruments such a…
The Handbook of MPEG Applications. Standards in Practice
3
This book provides a comprehensive examination of the use of MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A standards, providing a detailed reference to their application. In this book, the authors address five leading MPEG standards: MPEG-2, MPEG-4, MP…
This book provides a comprehensive examination of the use of MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A standards, providing a detailed reference to their application. In this book, the authors address five leading MPEG standards: MPEG-2, MPEG-4, MP…

Популярные авторы