Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 5079

The physical linkages responsible for carrying a company's data continue to be the most neglected components of the typical network—to the extent that nearly 70% of all network-related problems result from poor cabling.In this third edition of a widely acclaimed resource, three networking experts share their extensive experience, teaching you the cabling skills you need to build a reliable, efficient, and cost-effective network cabling... more...

In this text, students of applied mathematics, science and engineering are introduced to fundamental ways of thinking about the broad context of parallelism. The authors begin by giving the reader a deeper understanding of the issues through a general examination of timing, data dependencies, and communication. These ideas are implemented with respect to shared memory, parallel and vector processing, and distributed memory cluster computing. Threads,... more...

If you have programming experience and a familiarity with C--the dominant language in embedded systems--Programming Embedded Systems, Second Edition is exactly what you need to get started with embedded software. This software is ubiquitous, hidden away inside our watches, DVD players, mobile phones, anti-lock brakes, and even a few toasters. The military uses embedded software to guide missiles, detect enemy... more...

Enterprise data is growing at a much faster rate than traditional technologies allow. New enterprise architectures combining existing technologies are desperately needed. This book suggests a way forward by applying new techniques of the World Wide Web to enterprise information systems.Linking Enterprise Data is an edited volume contributed by worldwide leaders in Semantic Web and Linked Data research, standards development and adoption. Linking... more...

​The book presents a peer-reviewed collection of papers presented during the 10th issue of the Artificial Economics conference, addressing a variety of issues related to macroeconomics, industrial organization, networks, management and finance, as well as purely methodological issues. The field of artificial economics covers a broad range of methodologies relying on computer simulations in order to model and study the complexity of economic and... more...


Faithful communication is a necessary precondition for large-scale quantum information processing and networking, irrespective of the physical platform. Thus, the problems of quantum-state transfer and quantum-network engineering have attracted enormous interest over the last years, and constitute one of the most active areas of research in quantum information processing. The present volume introduces the reader to fundamental concepts and various... more...

Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two questions form the "core" of Cyber Situational Awareness. In addition, whether the last question can be well answered, is greatly dependent upon the cyber situational awareness capability of enterprises. Cyber Situational Awareness: Issues and Research is an... more...

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream... more...

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel  fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of... more...

"Complex Intelligent Systems and Applications" presents the most up-to-date advances in complex, software intensive and intelligent systems. Each self-contained chapter is the contribution of distinguished experts in areas of research relevant to the study of complex, intelligent, and software intensive systems. These contributions focus on the resolution of complex problems from areas of networking, optimization and artificial intelligence. The book... more...