Computers, Technology & Guides
Filter by price
- R0,00 - R100,00
- R101,00 - R250,00
- R251,00 - R500,00
- R501,00 - R1 000,00
- R1 001,00 - R2 500,00
- Over R2 501,00
Fans get to see another side of one of the most popular (but least understood) Star Wars characters in the latest of our best-selling sound books.
From the global authority in record-breaking comes the 11th edition of the world's best-selling gaming annual. Packed with the latest records, coolest stars and the biggest games, the Guinness World Records Gamer's Edition is the go-to bible for every gaming fan. Just ask the five million readers who've made it an international sensation!
Friedman, a Pulitzer Prize-winning columnist, and Mandelbaum, a leading foreign policy thinker, analyze four major challenges America faces today and spell out what we need to do now to rediscover America and rise to this moment.
The purpose of this text is to introduce a set of Petri-net-based tools and methods to address a variety of problems associated with the design and implementation of flexible manufacturing systems. several implementation examples are included.
Social media. One way or another, we all seem to be 'doing it'. Great. However, doing what exactly? Are you getting the results you expect? Do you have an approach that truly delivers ROI? This book deals with these questions.
The aim of this text is to present research efforts that have gone into, or are going on in, the systematic design of real-time programs. It does this by examining such areas as the characteristics of real-time/reactive programs, reactive programming languages, verification and refinements.
Adopts a detailed and methodological algorithmic approach to explain the concepts of pattern recognition. This book deals with topics such as: pattern representation, nearest neighour based classifiers, neural networks, support vector machines, and decision trees.
This is a textbook for a course in object-oriented software engineering at advanced undergraduate and graduate levels, as well as for software engineers. It contains more than 120 exercises of diverse complexity.
MATLAB is the language of technical computing most known and used in academia, industry and services. The book looks at the main tools, in particular the Desktop, Command and History Window, Editor and the Help Browser. It features number of functions, graphics objects, related properties and operators, considered fundamental in MATLAB.
Distributed systems are a continuously expanding area of computer science and computer engineering. This book addresses the need for literature on modeling and simulation techniques for distributed systems. It is intended as a text for related graduate-level university courses on distributed systems in computer science and computer engineering.
Security issues in ad-hoc and sensor networks have become extremely important. This book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed.
The Knowledge Grid is an intelligent and sustainable interconnection environment that consists of autonomous individuals, self-organized semantic communities, and adaptive networking mechanisms. This book presents its methodology, theory, models and applications. It features semantic peer-to-peer infrastructures for efficient knowledge sharing.
A guide to practical field use of the Global Positioning System, including information on using GPS with the latest mapping software.
Focuses on computational intelligence techniques and its applications. This book brings together many different aspects of the research on intelligence technologies such as neural networks, support vector machines, fuzzy logic and evolutionary computation. It presents fundamental concepts and essential analysis of various computational techniques.
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyzing network traffic data, with the intention of preventing, or quickly identifying, malicious activity.