Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Algebra (Discrete Mathematics and Theoretical Computer Science)

Buy

Network algebra considers the algebraic study of networks and their behavior. It approaches the models in a sharp and simple manner. This book takes an integrated view of a broad range of applications, varying from concrete hardware-oriented models to high-level software-oriented models.

(HTML tags aren't allowed.)

Autodesk Revit Architecture 2015: No Experience Required: Autodesk Official Press
Autodesk Revit Architecture 2015: No Experience Required: Autodesk Official Press

Learn Revit Architecture the hands-on way

For those who like to learn by doing, this Autodesk Official Press book shows you how to build a four-story office building one step at a time, providing you with real-world practice you might expect to encounter on the job. Concise explanations, focused examples, step-by-step...

iPhone SDK 3 Programming: Advanced Mobile Development for Apple iPhone and iPod touch
iPhone SDK 3 Programming: Advanced Mobile Development for Apple iPhone and iPod touch

Get the expert guidance you need to begin building native applications for Apple's new iPhone 3G as well as the iPod Touch

Apple's iPhone is the hottest mobile device on the planet. More than one million iPhone 3G phones were sold in the first three days of release and millions more are sure to be in the hands of iPhone fans each year....

Secure Messaging with Microsoft  Exchange Server 2003
Secure Messaging with Microsoft Exchange Server 2003

Get expert guidance to assess and help improve the security of your Exchange Server 2003 messaging systems. From risk assessment to implementation and auditing procedures, get critical guidance to help enhance the security of your messaging infrastructure. Written by a network security expert who works closely with the Microsoft Exchange...


Learning Metasploit Exploitation and Development
Learning Metasploit Exploitation and Development

Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security...

Beginning Database-Driven Application Development in Java EE: Using GlassFish (From Novice to Professional)
Beginning Database-Driven Application Development in Java EE: Using GlassFish (From Novice to Professional)

Beginning Database-Driven Application Development in Java™ EE: Using GlassFish™ focuses on the open source GlassFish persistence engine. This book shows Java programmers how to develop applications utilizing relational database technologies with examples using Oracle and MySQL and the GlassFish application development...

Microsoft Office 2003 Step by Step
Microsoft Office 2003 Step by Step

Experience learning made easy—and quickly teach yourself how to use Microsoft Office Access, Excel, FrontPage, InfoPath, OneNote, Outlook, PowerPoint, Publisher, and Word. With Step by Step, you can take just the lessons you need, or work from cover to cover. Either way, you drive the instruction—building and practicing the...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy