• Ebook Mobile communications (Second edition): Part 2

    Ebook Mobile communications (Second edition): Part 2

    Part 2 ebook "mobile communications" has contents: mobile network layer, mobile transport layer, support for mobility, outlook, the architecture of future networks, references, wireless application protocol.

     190 p hdu 04/07/2022 86 0

  • Ebook Computer networking: A top-down approach (6th edition): Part 1

    Ebook Computer networking: A top-down approach (6th edition): Part 1

    Part 1 book "Computer networking: A top-down approach" has contents: Computer networks and the internet, application layer, transport layer, the network layer.

     459 p hdu 04/07/2022 111 1

  • Ebook Computer networking: A top-down approach (6th edition): Part 2

    Ebook Computer networking: A top-down approach (6th edition): Part 2

    Part 2 book "Computer networking - A top down approach" has contents: The link layer links, access networks, and LANs; wireless and mobile networks, multimedia networking, security in computer networks, network management.

     430 p hdu 04/07/2022 91 0

  • Ebook Cryptography and Network Security: Principles and Practices (Fourth Edition)

    Ebook Cryptography and Network Security: Principles and Practices (Fourth Edition)

    Ebook Cryptography and Network Security: Principles and Practices (Fourth Edition) is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network...

     531 p hdu 04/07/2022 131 3

  • Ebook Handbook of applied cryptography

    Ebook Handbook of applied cryptography

    Ebook "Handbook of applied cryptography" present overview of cryptography; mathematical background; number-theoretic reference problems; public-key parameters; pseudorandom bits and sequences; stream ciphers; block ciphers; public-key encryption; hash functions and data integrity; digital signatures; key establishment protocols; key management techniques; efficient implementation; patents and standards; bibliography of papers from selected...

     794 p hdu 04/07/2022 78 0

  • Ebook Cryptography theory and practice (Third edition)

    Ebook Cryptography theory and practice (Third edition)

    "Ebook Cryptography theory and practice (Third edition)" present pseudorandom bit generation in cryptography; entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes; key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs; public key infrastructure, including identity-based cryptography; secret sharing schemes...

     611 p hdu 04/07/2022 87 1

  • Ebook Data Mining Practical Machine Learning Tools and Techniques

    Ebook Data Mining Practical Machine Learning Tools and Techniques

    Ebook "Data Mining Practical Machine Learning Tools and Techniques" present on: Machine learning tools and techniques, The Weka machine learning workbench,... Invite you to consult. Hope content useful document serves the academic needs and research.

     558 p hdu 04/07/2022 267 1

  • Ebook Fuzzy logic – Controls, concepts, theories and applications

    Ebook Fuzzy logic – Controls, concepts, theories and applications

    This book introduces new concepts and theories of Fuzzy Logic Control for the application and development of robotics and intelligent machines. The book consists of nineteen chapters categorized into 1) Robotics and Electrical Machines 2) Intelligent Control Systems with various applications, and 3) New Fuzzy Logic Concepts and Theories. The intended readers of this book are engineers, researchers, and graduate students interested in fuzzy...

     428 p hdu 04/07/2022 92 1

  • Ebook Fuzzy inference system – Theory and applications

    Ebook Fuzzy inference system – Theory and applications

    Evolution of global technologies has prompted increasing complexity of applications developed in both, the industry and the scientific research fields. These complexities are generally attributed to nonlinearities, poorly defined dynamics and absence of apriori information about the systems. Imprecision, uncertainties and vagueness in information about the system are also playing vital roles in enhancing the complexity of application. During...

     518 p hdu 04/07/2022 76 0

  • Giáo trình Logic mờ và ứng dụng

    Giáo trình Logic mờ và ứng dụng

    Lôgic mờ (tiếng Anh: Fuzzy logic) được phát triển từ lý thuyết tập mờ để thực hiện lập luận một cách xấp xỉ thay vì lập luận chính xác theo lôgic vị từ cổ điển. Lôgic mờ có thể được coi là mặt ứng dụng của lý thuyết tập mờ để xử lý các giá trị trong thế giới thực cho các bài toán phức tạp (Klir 1997). Người ta hay nhầm lẫn mức...

     210 p hdu 04/07/2022 140 1

  • Ebook Fundamentals of Database Systems (6/e): Part 1

    Ebook Fundamentals of Database Systems (6/e): Part 1

    Part 1 book “Fundamentals of Database Systems” has contents: databases and database users, database system concepts and architecture, the relational data model and relational database constraints, the relational algebra and relational calculus, object and object-relational databases,… and other contents.

     609 p hdu 04/07/2022 86 0

  • Ebook Fundamentals of Database Systems (6/e): Part 2

    Ebook Fundamentals of Database Systems (6/e): Part 2

    Part 2 book “Fundamentals of Database Systems” has contents: indexing structures for files, algorithms for query processing and optimization, physical database design and tuning, concurrency control techniques, database recovery techniques, database security, distributed databases, distributed databases,… and other contents.

     592 p hdu 04/07/2022 85 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=hdu