eBooks-it.org Logo
eBooks-IT.org Inner Image

Wiley eBooks Page 21

Download free Wiley eBooks Page 21

Modern Compiler Design

Modern Compiler Design Image
While focusing on the essential techniques common to all language paradigms, this book provides readers with the skills required for modern compiler construction. All the major programming types (imperative, object-oriented, functional, logic, and distributed) are covered. Practical emphasis is placed on implementation and optimization techniques, which includes tools for automating compiler design....

Digital Data Integrity

The Evolution from Passive Protection to Active Management
Digital Data Integrity Image
How to plan your future strategy for efficient, cost-saving data management Businesses have historically treated data protection as an afterthought, as simply making an occasional copy of data that could be used in the future. Today, this attitude is changing rapidly. The ever-increasing amount of data, along with the emphasis on continuous availability, necessitates changes in the approach to data integrity, which results in management and protection becoming much more closely aligned. Digital Data Integrity throws light on the data integrity landscape of the future. It provides the reader with a brief overview of the historical methods and subsequent evolution of data protection. The text shows how the whole subject of data integrity is changing an...

Learning from Data

Concepts, Theory and Methods
Learning from Data Image
2nd Edition
An interdisciplinary framework for learning methodologies-covering statistics, neural networks, and fuzzy logic, this book provides a unified treatment of the principles and methods for learning dependencies from data. It establishes a general conceptual framework in which various learning methods from statistics, neural networks, and fuzzy logic can be applied-showing that a few fundamental principles underlie most new methods being proposed today in statistics, engineering, and computer science. Complete with over one hundred illustrations, case studies, and examples making this an invaluable text....

Character Recognition Systems

A Guide for Students and Practitioners
Character Recognition Systems Image
"Much of pattern recognition theory and practice, including methods such as Support Vector Machines, has emerged in an attempt to solve the character recognition problem. This book is written by very well-known academics who have worked in the field for many years and have made significant and lasting contributions. The book will no doubt be of value to students and practitioners." -Sargur N. Srihari, SUNY Distinguished Professor, Department of Computer Science and Engineering, and Director, Center of Excellence for Document Analysis and Recognition (CEDAR), University at Buffalo, The State University of New York "The disciplines of optical character recognition and document image analysis have a history of more than forty years. In th...

The Shellcoder's Handbook

Discovering and Exploiting Security Holes
The Shellcoder's Handbook Image
Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur againA unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating systemShows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques...



2007 - 2017 © eBooks-IT.org