• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Information Theory

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Information Theory

ilość książek w kategorii: 3051

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 The Design and Implementation of a Log-Structured File System Rosenblum, Mendel 9781461359333 Springer
The Design and Implementation of a Log-Structured File System

ISBN: 9781461359333 / Angielski / Miękka / 132 str.

ISBN: 9781461359333/Angielski/Miękka/132 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mendel Rosenblum
Computersystemsresearch is heavilyinfluencedby changesincomputertechnol- ogy. As technology changes alterthe characteristics ofthe underlying hardware com- ponents of the system, the algorithms used to manage the system need to be re- examinedand newtechniques need to bedeveloped. Technological influencesare par- ticularly evident in the design of storage management systems such as disk storage managers and file systems. The influences have been so pronounced that techniques developed as recently as ten years ago are being made obsolete. The basic problem for disk storage managers is the...
Computersystemsresearch is heavilyinfluencedby changesincomputertechnol- ogy. As technology changes alterthe characteristics ofthe underlying hardware...
cena: 402,53

 Practical Intranet Security: Overview of the State of the Art and Available Technologies Ashley, Paul M. 9781461375661 Springer
Practical Intranet Security: Overview of the State of the Art and Available Technologies

ISBN: 9781461375661 / Angielski / Miękka / 244 str.

ISBN: 9781461375661/Angielski/Miękka/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paul M. Ashley; M. Vandenwauver
Foreword by Lars Knudsen
Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, the new security architecture SESAME, which builds on the Kerberos authentication system, adding to it both public-key technology and a role-based access control service. Other technologies are also included such as a description of how to program with the GSS-API, and modern security technologies such as PGP, S/MIME, SSH,...
Foreword by Lars Knudsen
Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a th...
cena: 805,10

 Information Retrieval: Uncertainty and Logics: Advanced Models for the Representation and Retrieval of Information Van Rijsbergen, C. J. 9781461375708 Springer
Information Retrieval: Uncertainty and Logics: Advanced Models for the Representation and Retrieval of Information

ISBN: 9781461375708 / Angielski / Miękka / 323 str.

ISBN: 9781461375708/Angielski/Miękka/323 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
C. J. Van Rijsbergen; Fabio Crestani; Mounia Lalmas
In recent years, there have been several attempts to define a logic for information retrieval (IR). The aim was to provide a rich and uniform representation of information and its semantics with the goal of improving retrieval effectiveness. The basis of a logical model for IR is the assumption that queries and documents can be represented effectively by logical formulae. To retrieve a document, an IR system has to infer the formula representing the query from the formula representing the document. This logical interpretation of query and document emphasizes that relevance in IR is an...
In recent years, there have been several attempts to define a logic for information retrieval (IR). The aim was to provide a rich and uniform represen...
cena: 1328,44

 Networking Security and Standards Weidong Kou 9781461378204 Springer
Networking Security and Standards

ISBN: 9781461378204 / Angielski / Miękka / 207 str.

ISBN: 9781461378204/Angielski/Miękka/207 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Weidong Kou
Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded...
Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modifi...
cena: 603,81

 High Performance Networking: Ifip Tc-6 Eighth International Conference on High Performance Networking (Hpn'98) Vienna, Austria, September 21-25, 19 Van as, Harmen R. 9781475753974 Springer
High Performance Networking: Ifip Tc-6 Eighth International Conference on High Performance Networking (Hpn'98) Vienna, Austria, September 21-25, 19

ISBN: 9781475753974 / Angielski / Miękka / 702 str.

ISBN: 9781475753974/Angielski/Miękka/702 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Harmen R. Van as; Harmen R. Van As
High Performance Networking is a state-of-the-art book that deals with issues relating to the fast-paced evolution of public, corporate and residential networks. It focuses on the practical and experimental aspects of high performance networks and introduces novel approaches and concepts aimed at improving the performance, usability, interoperability and scalability of such systems. Among others, the topics covered include:
  • Java applets and applications;
  • distributed virtual environments;
  • new internet streaming protocols;
  • web...
High Performance Networking is a state-of-the-art book that deals with issues relating to the fast-paced evolution of public, corporate and r...
cena: 805,10

 Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control Van Biene-Hershey, Margaret E. 9781475755312 Springer
Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control

ISBN: 9781475755312 / Angielski / Miękka / 192 str.

ISBN: 9781475755312/Angielski/Miękka/192 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Margaret E. Van Biene-Hershey; Leon A. M. Strous
This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems." IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related...
This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal...
cena: 603,81

 Protocols for High-Speed Networks VI: Ifip Tc6 Wg6.1 & Wg6.4 / IEEE Comsoc Tc on Gigabit Networking Sixth International Workshop on Protocols for High Touch, Joseph D. 9781475763188 Springer
Protocols for High-Speed Networks VI: Ifip Tc6 Wg6.1 & Wg6.4 / IEEE Comsoc Tc on Gigabit Networking Sixth International Workshop on Protocols for High

ISBN: 9781475763188 / Angielski / Miękka / 284 str.

ISBN: 9781475763188/Angielski/Miękka/284 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joseph D. Touch; James P. G. Sterbenz; Joseph D. Touch
1 This year marks the l0 h anniversary of the IFIP International Workshop on Protocols for High-Speed Networks (PfHSN). It began in May 1989, on a hillside overlooking Lake Zurich in Switzerland, and arrives now in Salem Massachusetts 6,000 kilometers away and 10 years later, in its sixth incarnation, but still with a waterfront view (the Atlantic Ocean). In between, it has visited some picturesque views of other lakes and bays of the world: Palo Alto (1990 - San Francisco Bay), Stockholm (1993 - Baltic Sea), Vancouver (1994- the Strait of Georgia and the Pacific Ocean), and Sophia- Antipolis...
1 This year marks the l0 h anniversary of the IFIP International Workshop on Protocols for High-Speed Networks (PfHSN). It began in May 1989, on a hil...
cena: 805,10

 Buffering Techniques for Delivery of Compressed Video in Video-On-Demand Systems Wu-Chi Feng 9781475770704 Springer
Buffering Techniques for Delivery of Compressed Video in Video-On-Demand Systems

ISBN: 9781475770704 / Angielski / Miękka / 133 str.

ISBN: 9781475770704/Angielski/Miękka/133 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wu-Chi Feng
Many emerging technologies such as video conferencing, video-on-demand, and digital libraries require the efficient delivery of compressed video streams. For applications that require the delivery of compressed stored multimedia streams, the a priori knowledge available about these compressed streams can aid in the allocation of server and network resources. By using a client-side buffer, the resource requirements from the server and network can be minimized.
Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems presents a comprehensive...
Many emerging technologies such as video conferencing, video-on-demand, and digital libraries require the efficient delivery of compressed video strea...
cena: 603,81

 Database Performance Tuning and Optimization: Using Oracle Mittra, Sitansu S. 9781475776973 Springer
Database Performance Tuning and Optimization: Using Oracle

ISBN: 9781475776973 / Angielski / Miękka / 489 str.

ISBN: 9781475776973/Angielski/Miękka/489 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sitansu S. Mittra
Presents an ideal mix of theory and practice, which allows the reader to understand the principle behind the application.; Coverage of performance tuning of datawarehouses offers readers the principles and tools they need to handle large reporting databases.; Material can also be used in a non-Oracle environment; Highly experienced author.
Presents an ideal mix of theory and practice, which allows the reader to understand the principle behind the application.; Coverage of performance tun...
cena: 201,24

 Data and Applications Security XVII: Status and Prospects de Capitani Di Vimercati, Sabrina 9781475780239 Springer
Data and Applications Security XVII: Status and Prospects

ISBN: 9781475780239 / Angielski / Miękka / 404 str.

ISBN: 9781475780239/Angielski/Miękka/404 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sabrina de Capitani Di Vimercati; Ray Indrakshi; Indrajit Ray

Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats.

Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing...

Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and,...

cena: 603,81

 High Performance Computing Systems and Applications Andrew Pollard Douglas J. K. Mewhort Donald F. Weaver 9781475783414 Springer
High Performance Computing Systems and Applications

ISBN: 9781475783414 / Angielski / Miękka / 602 str.

ISBN: 9781475783414/Angielski/Miękka/602 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew Pollard; Douglas J. K. Mewhort; Donald F. Weaver
High Performance Computing Systems and Applications contains the fully refereed papers from the 13th Annual Symposium on High Performance Computing, held in Kingston, Canada, in June 1999. This book presents the latest research in HPC architectures, distributed and shared memory performance, algorithms and solvers, with special sessions on atmospheric science, computational chemistry and physics.
High Performance Computing Systems and Applications is suitable as a secondary text for graduate level courses, and as a reference for researchers and practitioners in...
High Performance Computing Systems and Applications contains the fully refereed papers from the 13th Annual Symposium on High Performance Com...
cena: 603,81

 Advances in Information Retrieval: Recent Research from the Center for Intelligent Information Retrieval Croft, W. Bruce 9781475783605 Springer
Advances in Information Retrieval: Recent Research from the Center for Intelligent Information Retrieval

ISBN: 9781475783605 / Angielski / Miękka / 306 str.

ISBN: 9781475783605/Angielski/Miękka/306 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
W. Bruce Croft
The Center for Intelligent Information Retrieval (CIIR) was formed in the Computer Science Department ofthe University ofMassachusetts, Amherst in 1992. The core support for the Center came from a National Science Foun- tion State/Industry/University Cooperative Research Center(S/IUCRC) grant, although there had been a sizeable information retrieval (IR) research group for over 10 years prior to that grant. Thebasic goal ofthese Centers is to combine basic research, applied research, and technology transfer. The CIIR has been successful in each of these areas, in that it has produced over 270...
The Center for Intelligent Information Retrieval (CIIR) was formed in the Computer Science Department ofthe University ofMassachusetts, Amherst in 199...
cena: 805,10

 Middleware Networks: Concept, Design and Deployment of Internet Infrastructure Lerner, Michah 9781475783643 Springer
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure

ISBN: 9781475783643 / Angielski / Miękka / 376 str.

ISBN: 9781475783643/Angielski/Miękka/376 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michah Lerner; George Vanecek; Nino Vidovic
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure describes a framework for developing IP Service Platforms and emerging managed IP networks with a reference architecture from the AT&T Labs GeoPlex project. The main goal is to present basic principles that both the telecommunications industry and the Internet community can see as providing benefits for service-related network issues. As this is an emerging technology, the solutions presented are timely and significant.
Middleware Networks: Concept, Design and Deployment of Internet...
Middleware Networks: Concept, Design and Deployment of Internet Infrastructure describes a framework for developing IP Service Platf...
cena: 603,81

 Mathematics and Computer Science II: Algorithms, Trees, Combinatorics and Probabilities Chauvin, Brigitte 9783034894753 Birkhauser
Mathematics and Computer Science II: Algorithms, Trees, Combinatorics and Probabilities

ISBN: 9783034894753 / Angielski / Miękka / 543 str.

ISBN: 9783034894753/Angielski/Miękka/543 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brigitte Chauvin; Philippe Flajolet; Daniele Gardy

This is the second volume in a series of innovative proceedings entirely devoted to the connections between mathematics and computer science. Here mathematics and computer science are directly confronted and joined to tackle intricate problems in computer science with deep and innovative mathematical approaches.

The book serves as an outstanding tool and a main information source for a large public in applied mathematics, discrete mathematics and computer science, including researchers, teachers, graduate students and engineers. It provides an overview of the current questions in...

This is the second volume in a series of innovative proceedings entirely devoted to the connections between mathematics and computer science. Here ...

cena: 402,53

 Cryptology and Network Security: 12th International Conference, Cans 2013, Paraty, Brazil, November 20-22, 2013, Proceedings Abdalla, Michel 9783319029368 Springer
Cryptology and Network Security: 12th International Conference, Cans 2013, Paraty, Brazil, November 20-22, 2013, Proceedings

ISBN: 9783319029368 / Angielski / Miękka / 349 str.

ISBN: 9783319029368/Angielski/Miękka/349 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michel Abdalla; Cristina Nita-Rotaru; Ricardo Dahab

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.

The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.


This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, ...

cena: 201,24

 Informationstheorie Und Codierung Otto Mildenberger 9783528030469 Vieweg+teubner Verlag
Informationstheorie Und Codierung

ISBN: 9783528030469 / Niemiecki / Miękka / 199 str.

ISBN: 9783528030469/Niemiecki/Miękka/199 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Otto Mildenberger
Die Informationstheorie gehOrt zu den Grundlagen fUr alle Wissenschaftsgebiete, die sich mit der Obertragung von Nachrichten und dei Verarbeitung von Informationen befassen. Ihre Geburtsstunde wird auf das Jahr 1948 dadiert, in dem C. E. Shannon seine grundlegenden Untersuchungen tiber das Wesen von Nachrichten veroffentlichte. In diesem Buch werden die auf den Gedanken von Shannon basierenden Grundla gen der Informationstheorie dargestellt und zusatzlich wichtige Teile der Codierungs theorie. Einige Codierungsmethoden, z.B. Verfahren zur Quellencodierung (Ab schnitt 5) sind ohne Kenntnisse...
Die Informationstheorie gehOrt zu den Grundlagen fUr alle Wissenschaftsgebiete, die sich mit der Obertragung von Nachrichten und dei Verarbeitung von ...
cena: 206,88

 Digital-Forensics and Watermarking: 11th International Workshop, Iwdw 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers Shi, Yun Q. 9783642400988 Springer
Digital-Forensics and Watermarking: 11th International Workshop, Iwdw 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers

ISBN: 9783642400988 / Angielski / Miękka / 536 str.

ISBN: 9783642400988/Angielski/Miękka/536 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi; Fernando Perez-Gonzalez; Hyoung Joong Kim
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, he...
cena: 201,24

 Irreguläre Abtastung: Signaltheorie Und Signalverarbeitung Neubauer, André 9783642624360 Springer
Irreguläre Abtastung: Signaltheorie Und Signalverarbeitung

ISBN: 9783642624360 / Niemiecki / Miękka / 435 str.

ISBN: 9783642624360/Niemiecki/Miękka/435 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andre Neubauer

Behandelt die signaltheoretischen Grundlagen der irregularen Abtastung ausgehend von einer exakten funktionalanalytischen Betrachtungsweise sowie der auch in der Wavelet-Theorie verwendeten Theorie der Rahmen. Ferner werden die fur die Anwendung der irregularen Abtastung in der Signalverarbeitung erforderlichen Rekonstruktionsalgorithmen fur verschiedene Signalklassen Frequenzband-begrenzter Signale hergeleitet. Eine Diskussion von praxisrelevanten Beispielanwendungen der irregularen Abtastung rundet die Darstellung ab. Das Buch zeichnet sich durch eine prazise und vollstandige...

Behandelt die signaltheoretischen Grundlagen der irregularen Abtastung ausgehend von einer exakten funktionalanalytischen Betrachtungsweise sowie d...

cena: 319,76

 Theorie und Implementierung von symmetrischen Verschlüsselungen Jeff Behnke 9783656139010 Grin Verlag
Theorie und Implementierung von symmetrischen Verschlüsselungen

ISBN: 9783656139010 / Niemiecki / Miękka / 36 str.

ISBN: 9783656139010/Niemiecki/Miękka/36 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jeff Behnke
Facharbeit (Schule) aus dem Jahr 2010 im Fachbereich Informatik - Theoretische Informatik, Note: 13 Punkte, Besselgymnasium Minden, Sprache: Deutsch, Abstract: Die Kryptologie spielt in unserer heutigen Zeit eine immer wichtiger werdende Rolle. Dies ist durch den Wandel der Industrie- zur Informationsgesellschaft zu erklaren. Jeder hat taglich mit kryptologischen Techniken kontakt. Die Einsatz-gebiete im taglichen Leben reichen von Mobiltelefonen, uber PCs und ihre Netzwerke, hin zum bargeldlosen Bezahlen mittels EC-Karte, oder dem in An-spruch nehmen von Pay-TV Diensten. Hierbei werden...
Facharbeit (Schule) aus dem Jahr 2010 im Fachbereich Informatik - Theoretische Informatik, Note: 13 Punkte, Besselgymnasium Minden, Sprache: Deutsch, ...
cena: 165,49

 Distributed and Parallel Embedded Systems: Ifip Wg10.3/Wg10.5 International Workshop on Distributed and Parallel Embedded Systems (Dipes'98) October 5 Rammig, Franz J. 9781475750065 Springer
Distributed and Parallel Embedded Systems: Ifip Wg10.3/Wg10.5 International Workshop on Distributed and Parallel Embedded Systems (Dipes'98) October 5

ISBN: 9781475750065 / Angielski / Miękka / 240 str.

ISBN: 9781475750065/Angielski/Miękka/240 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Franz J. Rammig
Embedded systems are becoming one of the major driving forces in computer science. Furthermore, it is the impact of embedded information technology that dictates the pace in most engineering domains. Nearly all technical products above a certain level of complexity are not only controlled but increasingly even dominated by their embedded computer systems.
Traditionally, such embedded control systems have been implemented in a monolithic, centralized way. Recently, distributed solutions are gaining increasing importance. In this approach, the control task is carried out by a number of...
Embedded systems are becoming one of the major driving forces in computer science. Furthermore, it is the impact of embedded information technology th...
cena: 805,10

Pierwsza Podprzednia  115  116  117  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia