Tento autor sa s neuveriteľnou vášňou a vytrvalosťou ponoril do sveta tučniakov. Jeho celoživotná láska k fotografii a zvieratám ho viedla k tomu, aby strávil dve letá na južných oceánoch a dokumentoval sedemnásť druhov tučniakov v ich prirodzenom prostredí. Táto expedícia nebola len o zachytení obrazov, ale aj o hlbokom bádaní, ktoré spojilo najnovší výskum s jeho pôsobivými fotografiami. Výsledkom je dielo, ktoré ponúka bezprecedentný pohľad do života týchto fascinujúcich vtákov a predstavuje ich deťom prostredníctvom pútavých príbehov doplnených o vlastné fotografie autora.
The book addresses the crucial role of coding in computer and data communications while simplifying the complex mathematics often associated with it. By focusing on practical understanding, it aims to make the concepts of coding more accessible, enabling readers to grasp its significance without getting bogged down by heavy mathematical theories.
The book highlights a variety of lesser-known data compression codes that possess unique and beneficial properties, such as specific bit patterns and robustness. Aimed at professionals and students in computer science, it seeks to broaden the understanding of these alternative coding methods beyond the commonly used Huffman and Golomb codes, showcasing their potential applications and advantages in the field of data compression.
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the reader’s knowledge - answers are also provided. Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.
Panda lovers will love following a giant panda and her cub in this engaging Science Reader from Step into Reading. Full of incredible photos and panda facts! Readers will learn how one mother panda and her cub are being protected and raised in a Chinese panda reserve, which seeks to help this vulnerable species survive. In fact, ChiDa, the panda cub, is being prepared to be released into the wild--once she is old enough and has learned important life skills from her mom! Young readers will find themselves rooting for ChiDa while decoding the simple text and gaining confidence in their reading. This book's fascinating photographs of pandas and its array of panda facts will captivate young nonfiction lovers. Great for proficient or reluctant readers. Step 3 Readers feature engaging characters in easy-to-follow plots about popular topics, for children who are ready to read on their own.
A complete course in TeX that will be suitable for users of TeX who want to advance beyond the basics. The initial chapters introduce the essential workings of TeX and the later chapters cover a wide range of advanced topics such as macros, conditionals, tokens, leaders, file I/O, the line- and page-break algorithms, and output routines.
This book introduces perspective, and discusses the mathematics of perspective in a detailed, yet accessible style. It also reviews nonlinear projections, including the fisheye, panorama, and map projections frequently used to enhance digital images. Topics and features include a complete and self-contained presentation of concepts, principles, and methods; a 12-page colour section, and numerous figures. This essential resource for computer professionals both within and outside the field of Computer Graphics is also suitable for graduates and advanced undergraduates in Computer Graphics and Computer-Aided Design. Key ideas are introduced, examined and illustrated by figures and examples, and reinforced through solved exercises.
"This new edition of Data Compression provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, a description of most common methods, and discussions on the use and comparative benefits of methods and descriptions of "how to" use them. The presentation is organized into the main branches of the field of data compression: run length encoding, statistical methods, dictionary-based methods, image compression, audio compression, and video compression." "The book provides an invaluable reference and guide for all computer scientists, computer engineers, electrical engineers, signal/image processing engineers, and other scientists needing a comprehensive compilation for a broad range of compression methods."--BOOK JACKET.
Focusing on data compression, this book provides a clear and concise foundation for key topics in the field. It is designed as a practical reference for advanced undergraduates in computer science, ensuring accessibility with minimal mathematical requirements.
A serious look at J. R. R. Tolkien's elvish tongue Sindarin, by means of its
grammar, morphology, and history. Supplemental material includes a vocabulary,
Sindarin names, and a glossary of terms.