Unix. Possibly, the longest living entity in the computer land where nothing survives more than a couple of years, a decade at the most. It has been around for more than two decades, owing its longevity to the ruggedness built into it and its commands.
This book comes in two parts. The first part is a journey into the vast expanse that is Unix. T…
This book is the second edition of a text designed for undergraduate engineering courses in Data Structures. The treatment of the subject matter in this second edition maintains the same general philosophy as in the first edition but with significant additions These changes are designed to improve the readability and understandability of all algorit…
This Third Edition, in response to the enthusiastic reception given by academia and students to the previous edition, offers a cohesive presentation of all aspects of theoretical computer science, namely automata formal languages, computability, and complexity. Besides, it includes coverage of mathematical preliminaries.
NEW TO THIS EDITION
Ex…
Simplifies all aspects of creating digital graphics.
Detailed discussions on Computer Animation, Graphic I/O Devices.
Algorithms presented in 'C' language.
Over 41O solved examples, problems and objective questions.
Law Relating to Intellectual Property: Patents, Trademarks, Copyright, Designs, Geographical Indications, Semiconductor Integrated Circuits Layout-Design, Protection of Plant Verities and Farmers' Rights, and Trips
Due to increasing sophistication in attackers' ability to launch attacks and growing dependence of users on the Internet, development of effective security mechanism has become a necessity while being a challenging task. Network and Information Security: Issues, Challenges and Research Trends takes a holistic view for understanding of different type…
India is in the midst of a cyber-legal-commercial revolution. In order to provide a smooth tramition for e-commerce and e-governance, the IT Act, 2000 has been enacted by the Indian Parliament. The Act provides a legal framework for e-commerce and is a step towards facilitating and enforcing legal discipline.
Cyber Law Simplified presents a harmo…
The sixth edition of the Information Security Management Handbook addresses up-to-date-issues in this increasingly important area. It balances contemporary articles with relevant articles from past editions to bring you a well grounded view of the subject. The contributions cover questions important to those tasked with securing information assets i…
Computational inference has taken its place alongside asymptotic inference and exact techniques in the standard collection of statistical methods. Computational inference is based on an approach to statistical methods that uses modern computational power to simulate distributional properties of estimators and test statistics. This book describes com…