113 books (6 pages) in this category
For iPhone 4s, iPhone 5, iPhone 5s, and iPhone 5c, iPhone 6, iPhone 6+, iPhone 6s, and iPhone 6s Plus
by Scott La Counte
<p>If you believe some news stories, the latest iPhone update (iOS 9) is radically different and you should beware of updating! They’re wrong! This book is for both new users of iPhone and those upgrading to the latest update. I’ll walk ...eBook
Defend your systems from methodized and proficient attackers
by Chiheb Chebbi
<p><strong>A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure</strong></p> <h4>Key Features</h4> <ul> <li>Advanced exploitation ...eBook
by Blanchet-Sadri, Francine
The discrete mathematics and theoretical computer science communities have recently witnessed explosive growth in the area of algorithmic combinatorics on words. The next generation of research on combinatorics of partial words promises to have ...eBook
by Barbosa, V.C.
An Atlas Of Edge-Reversal Dynamics is the first in-depth account of the graph dynamics system SER (Scheduling by Edge Reversal), a powerful distributed mechanism for scheduling agents in a computer system. The study of SER draws on strong ...eBook
by Mollin, Richard A.
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well ...eBook
OS X Support Essentials 10.10: Supporting and Troubleshooting OS X Yosemite
by Kevin M. White & Gordon Davisson
<p>This is the official curriculum of the Apple Yosemite 101: OS X Support Essentials 10.10 course and preparation for Apple Certified Support Professional (ACSP) 10.10 certification–as well as a top-notch primer for anyone who needs to support,eBook
by Molitierno, Jason J.
<P>On the surface, matrix theory and graph theory seem like very different branches of mathematics. However, adjacency, Laplacian, and incidence matrices are commonly used to represent graphs, and many properties of matrices can give us useful ...eBook
by Roberts, Fred
<P>Now with solutions to selected problems, <STRONG>Applied Combinatorics, Second Edition</STRONG> presents the tools of combinatorics from an applied point of view. This bestselling textbook offers numerous references to the literature of ...eBook
From Theory to Practice
by Ahcene Bounceur, Madani Bezoui & Reinhardt Euler
<p><em>Boundaries and Hulls of Euclidean Graphs: From Theory to Practice</em> presents concepts and algorithms for finding convex, concave and polygon hulls of Euclidean graphs. It also includes some implementations, determining and comparing ...eBook
by Kishore Gaddam
<p><strong>Build intelligent and smart conversational interfaces using Microsoft Bot Framework</strong></p> <h2>About This Book</h2> <ul> <li>Develop various real-world intelligent bots from scratch using Microsoft Bot ...eBook
by Chartrand, Gary
<P>Beginning with the origin of the four color problem in 1852, the field of graph colorings has developed into one of the most popular areas of graph theory. Introducing graph theory with a coloring theme, <STRONG>Chromatic Graph ...eBook
by Mollin, Richard A.
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. ...eBook
by Gross, Jonathan L.
<STRONG>Combinatorial Methods with Computer Applications</STRONG> provides in-depth coverage of recurrences, generating functions, partitions, and permutations, along with some of the most interesting graph and network topics, design ...eBook
by Bona, Miklos
<P><EM>A Unified Account of Permutations in Modern Combinatorics<BR></EM>A 2006 <EM>CHOICE</EM> Outstanding Academic Title, the first edition of this bestseller was lauded for its detailed yet engaging treatment of permutations. Providing more ...eBook
by Mansour, Toufik
<P>Focusing on a very active area of mathematical research in the last decade, <STRONG>Combinatorics of Set Partitions</STRONG> presents methods used in the combinatorics of pattern avoidance and pattern enumeration in set partitions. Designed ...eBook
by Chen, Lidong
<P>Helping current and future system designers take a more productive approach in the field, <STRONG>Communication System Security</STRONG> shows how to apply security principles to state-of-the-art communication systems. The authors use ...eBook
Eliminate the hassles of Active Directory - install Windows 2000 without it!<br>Windows 2000 is undoubtedly a great product. In one year after its release, Microsoft have sold have sold 10 million licenses. System administrators are praising itseBook
by Marcus Schaefer
<p>Crossing Numbers of Graphs is the first book devoted to the crossing number, an increasingly popular object of study with surprising connections. The field has matured into a large body of work, which includes identifiable core results and ...eBook
by Hinek, M. Jason
<P>Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, ...eBook
by Lindner, Charles C.
<P><STRONG>Design Theory, Second Edition</STRONG> presents some of the most important techniques used for constructing combinatorial designs. It augments the descriptions of the constructions with many figures to help students understand and ...eBook