Search

Search Results

Results 1-10 of 12 (Search time: 0.125 seconds).
Item hits:
  • Book


  • Authors: Bùi Huy Hiền (2011)

  • Tóm tắt lý thuyết, bài tập về logic tập hợp và quan hệ, nửa nhóm và nhóm, vành và trường, vành đa thức, vành chính và vành Ơclit, đa thức trên các trường số...

  • Book


  • Authors: James A. Brannan (2011)

  • Develop, test, and debug iPhone, iPad, and iPod touch applications with help from this practical resource. iOS SDK Programming: A Beginner's Guide shows you how to use Objective-C and Apple's new Xcode 4 development environment with an integrated, easy-to-use Interface Builder. You'll learn which UIView subclasses to use when laying out an iOS app and master all of the iOS user interface controls. Setting application preferences and storing application data are also covered. The book explains how to integrate multimedia into your apps and develop universal apps that run on the iPhone, iPod touch, and iPad. You'll learn how to take advantage of the iPad's larger display and the new features of iOS 4.2.

  • Book


  • Authors: John C. Martin (2011)

  • Introduction to Languages and the Theory of Computation helps students make the connection between the practice of computing and an understanding of the profound ideas that defines it. The book's organization and the author's ability to explain complex topics clearly make this introduction to the theory of computation an excellent resource for a broad range of upper level students. The author has learned through many years of teaching that the best way to present theoretical concepts is to take advantage of the precision and clarity of mathematical language. In a way that is accessible to students still learning this language, he presents the necessary mathematical tools gently and gradually which provides discussion and examples that make the language intelligible.

  • Book


  • Authors: David R. Miller (2011)

  • Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems.

  • Book


  • Authors: Priscilla Oppenheimer (2011)

  • The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability.

  • Book


  • Authors: James A. O'Brien (2011)

  • The benchmark text for the syllabus organised by technology (a week on databases, a week on networks, a week on systems development, etc.) taught from a managerial perspective. O'Brien defines technology and then explains how companies use the technology to improve performance. Real world cases finalise the explanation.

  • Book


  • Authors: Yang Xiao (2011)

  • This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style; each containing a comprehensive overview, the latest pioneering work and future research direction of a research topic.

  • Book


  • Authors: Andrew S. Tanenbaum (2011)

  • Computer Networks, 5/e is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Electrical Engineering, CIS, MIS, and Business Departments.Tanenbaum takes a structured approach to explaining how networks work from the inside out. He starts with an explanation of the physical layer of networking, computer hardware and transmission systems; then works his way up to network applications. Tanenbaum's in-depth application coverage includes email; the domain name system; the World Wide Web (both client- and server-side); and multimedia (including voice over IP, Internet radio video on demand, video conferencing, and streaming media. Each chapter follows a consistent approach: Tanenbaum presents key princ...

  • Book


  • Authors: Robert Sedgewick; Kevin Wayne (2011)

  • This fourth edition of Robert Sedgewick and Kevin Wayne’s Algorithms is the leading textbook on algorithms today and is widely used in colleges and universities worldwide. This book surveys the most important computer algorithms currently in use and provides a full treatment of data structures and algorithms for sorting, searching, graph processing, and string processing--including fifty algorithms every programmer should know. In this edition, new Java implementations are written in an accessible modular programming style, where all of the code is exposed to the reader and ready to use. The algorithms in this book represent a body of knowledge developed over the last 50 years that has become indispensable, not just for professional programmers and computer science students but for...