Login       My Wishlist
  My Cart
$0.00 / 0 items
 
EMS Linux
Utilizing the Best Tools With Linux
 
International Access
Global Shipping Options Available
Home About Us News Our Blog Our Catalog My Cart My Account Track Shippment Contact Us
  Our Catalog   Software Design, Testing & Engineering   Coding Theory

Coded Character Sets: History and Development


Coded Character Sets: History and Development by Addison-Wesley at EMS Linux. SKU: 0813-WS0401-A03006-0201144603. Hurry! Limited time offer. Offer valid only while supplies last.


Additional Information

Manufacturer:Addison-Wesley
Publisher:Addison-Wesley
Studio:Addison-Wesley
SKU:0813-WS0401-A03006-0201144603
EAN:9780201144604
Package Weight:1.58 pounds
Package Size:6.57 x 1.1 x 1.1 inches

Coded Character Sets: History and Development by Addison-Wesley

Buy Now:
Coded Character Sets: History and Development

Brand: Addison-Wesley
SKU: #0813-WS0401-A03006-0201144603
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
$90.99


Quantity:  

 


View More In Coding Theory.

 


Have questions about this item, or would like to inquire about a custom or bulk order?


If you have any questions about this product by Addison-Wesley, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Last:
Email Address:
Your Message:

Related Best Sellers


ean: 9780792372776, isbn: 0792372778,
Iterative Detection: Adaptivity, Complexity Reduction, and Applications is a primary resource for both researchers and teachers in the field of communication. Unlike other books in the area, it presents a general view of iterative detection that does...

ean: 9781584881278, isbn: 1584881275,
INTRODUCTION FOR THE UNINITIATEDHeretofore, there has been no suitable introductory book that provides a solid mathematical treatment of cryptography for students with little or no background in number theory. By presenting the necessary mathematics ...

ean: 9780521119917, isbn: 052111991X,
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in th...

ean: 9780321185785, isbn: 0321185781,
Unicode provides a unique number for every character, no matter what the platform, no matter what the program, no matter what the language. Fundamentally, computers just deal with numbers. They store letters and other characters by assigning a number...

ean: 9780824786113, isbn: 0824786114,
Book by Hoffman, D. G., Leonard, D.A., Lidner, C.C., Phelps, K.T., Rodger, C.A., WalUsed Book in Good Condition. ...

ean: 9780471880745, isbn: 0471880744,
This practical handbook provides communication systems engineers with guidance in the application of error-control coding. It emphasizes the fundamental concepts of coding theory while minimizing the use of mathematical tools...demonstrates the role ...

ean: 9780521131704, isbn: 0521131707,
Fundamentals of Error Correcting Codes is an in-depth introduction to coding theory from both an engineering and mathematical viewpoint. It reviews classical topics, and gives much coverage of recent techniques which could previously only be found in...

ean: 9781576103906, isbn: 1576103900,
Provides a detailed reference on all Basic control structures, data types, and other code mechanisms. Includes step-by-step instructions on how to build common code structures in VB, from simple if statements to objects and ActiveX components. Lays o...

ean: 9780198538035, isbn: 0198538030,
Algebraic coding theory is a new and rapidly developing subject, popular for its many practical applications and for its fascinatingly rich mathematical structure. This book provides an elementary yet rigorous introduction to the theory of error-corr...

ean: 9781629142067, isbn: 1629142069,
Ever since humans first began to communicate, we’ve had secrets to keep — secrets of state, war, business, or the heart. From the moment the first secret message was sent, others were busy trying to decipher it. By rearranging, substituting, or tr...



Privacy Policy / Terms of Service
© 2018 - emslinux.com. All Rights Reserved.