En poursuivant votre navigation, vous acceptez l'utilisation de cookies qui permettront notamment de vous offrir contenus, services, et publicités liés à vos centres d'intérêt. Fermer
LogoEntete
Entete

Accueil > REFERENCE > COMPUTERS > Data Processing > Tout Data Processing
Mon Compte
Me Connecter



F.A.Q.

Contact


Télécharger le livre :  Monitoring Microservices and Containerized Applications

Monitoring Microservices and Containerized Applications

36,47

Navin Sabharwal , Piyush Pandey
Apress

Discover the methodologies and best practices for getting started with container services monitoring using Prometheus, AppDynamics, and Dynatrace. The book begins with the basics of working with the containerization and microservices architecture while...

Ajouter au panier
Télécharger le livre :  Multivariate Public Key Cryptosystems

Multivariate Public Key Cryptosystems

126,59

Jintai Ding , Dieter S. Schmidt , Albrecht Petzoldt
Springer

This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the...

Ajouter au panier
Télécharger le livre :  Algorithmic Combinatorics: Enumerative Combinatorics, Special Functions and Computer Algebra

Algorithmic Combinatorics: Enumerative Combinatorics, Special Functions and Computer Algebra

116,04

Carsten Schneider , Veronika Pillwein
Springer

The book is centered around the research areas of combinatorics, special functions, and computer algebra. What these research fields share is that many of their outstanding results do not only have applications in Mathematics, but also other disciplines, such as...

Ajouter au panier
Télécharger le livre :  Patterns in Past Settlements: Geospatial Analysis of Imprints of Cultural Heritage on Landscapes

Patterns in Past Settlements: Geospatial Analysis of Imprints of Cultural Heritage on Landscapes

147,69

M.B. Rajani
Springer

This book is an introduction to a new branch of archaeology that scrutinises landscapes to find evidence of past human activity. Such evidence can be hard to detect at ground-level, but may be visible in remote sensing (RS) imagery from aerial platforms and...

Ajouter au panier
Télécharger le livre :  Predictive Analytics

Predictive Analytics

121,75

Ajit C. Tamhane
Wiley

Provides a foundation in classical parametric methods of regression and classification essential for pursuing advanced topics in predictive analytics and statistical learning This book covers a broad range of topics in parametric regression and...

Ajouter au panier
Télécharger le livre :  Inventive Communication and Computational Technologies

Inventive Communication and Computational Technologies

252,14

Álvaro Rocha , Joy Chen , G. Ranganathan
Springer

This book gathers selected papers presented at the 4th International Conference on Inventive Communication and Computational Technologies (ICICCT 2020), held on 28–29 May 2020 at Gnanamani College of Technology, Tamil Nadu, India. The respective contributions...

Ajouter au panier
Télécharger le livre :  Design Patterns in C#

Design Patterns in C#

36,47

Vaskaran Sarcar
Apress

Get hands-on experience with each Gang of Four (GoF) design pattern using C#. For each of the patterns, you will see at least one real-world scenario, a coding example, and a complete implementation including output. In addition to GoF patterns, you will learn...

Ajouter au panier
Télécharger le livre :  A New Perspective of Cultural DNA

A New Perspective of Cultural DNA

126,59

Ji-Hyun Lee
Springer

This book presents selected papers from the 3rd Cultural DNA Workshop. Contributed by prominent computational design experts in the fields of mechanical engineering and architectural design, they mainly focus on the design process; shape grammars as a valuable tool;...

Ajouter au panier
Télécharger le livre :  Malware Analysis and Detection Engineering

Malware Analysis and Detection Engineering

56,19

Abhijit Mohanta , Anoop Saldanha
Apress

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis...

Ajouter au panier
Télécharger le livre :  Wide Area Power Systems Stability, Protection, and Security

Wide Area Power Systems Stability, Protection, and Security

126,59

Almoataz Y. Abdelaziz , Hassan Haes Alhelou , Pierluigi Siano
Springer

This book proposes new control and protection schemes to improve the overall stability and security of future wide-area power systems. It focuses on the high penetration levels of renewable energy sources and distributed generation, particularly with the trend...

Ajouter au panier