Clankart Logo

Buy used Bachelor of Technology (B.Tech) books online in India

Buy Second Hand Books, Used Books Online In India

Introduction to algorithms

Introduction to algorithms

₹450

A comprehensive update of the leading algorithms text, with new material on matchings in bipartite graphs, online algorithms, machine learning, and other topics.Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms uniquely combines rigor and comprehensiveness. It covers a broad range of algorithms in depth, yet makes their design and analysis accessible to all levels of readers, with self-contained chapters and algorithms in pseudocode. Since the publication of the first edition, Introduction to Algorithms has become the leading algorithms text in universities worldwide as well as the standard reference for professionals. This fourth edition has been updated throughout.New for the fourth edition New chapters on matchings in bipartite graphs, online algorithms, and machine learningNew material on topics including solving recurrence equations, hash tables, potential functions, and suffix arrays140 new exercises and 22 new problemsReader feedback-informed improvements to old problemsClearer, more personal, and gender-neutral writing styleColor added to improve visual presentationNotes, bibliography, and index updated to reflect developments in the fieldWebsite with new supplementary materialWarning: Avoid counterfeit copies of Introduction to Algorithms by buying only from reputable retailers. Counterfeit and pirated copies are incomplete and contain errors.

2 months ago
Advertisement
Clean code: A handbook of agile software craftsmanship

Clean code: A handbook of agile software craftsmanship

₹450

Even bad code can function. But if code isn't clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn't have to be that way. Noted software expert Robert C. Martin presents a revolutionary paradigm with Clean Code: A Handbook of Agile Software Craftsmanship . Martin has teamed up with his colleagues from Object Mentor to distill their best agile practice of cleaning code "on the fly" into a book that will instill within you the values of a software craftsman and make you a better programmer-but only if you work at it. What kind of work will you be doing? You'll be reading code-lots of code. And you will be challenged to think about what's right about that code, and what's wrong with it. More importantly, you will be challenged to reassess your professional values and your commitment to your craft. Clean Code is divided into three parts. The first describes the principles, patterns, and practices of writing clean code. The second part consists of several case studies of increasing complexity. Each case study is an exercise in cleaning up code-of transforming a code base that has some problems into one that is sound and efficient. The third part is the payoff: a single chapter containing a list of heuristics and "smells" gathered while creating the case studies. The result is a knowledge base that describes the way we think when we write, read, and clean code.

2 months ago
Want to see your books here? Have Used Books?
Make some extra cash by selling your old books for actual money in your UPI/Bank account. Go on, it's quick and easy.
Operating system concepts

Operating system concepts

₹300

Written in an easy-to-understand style, this textbook, now in its third edition, continues to discuss in detail important concepts and major developments in network security and management. It is designed for a one-semester course for undergraduate students of Computer Science, Information Technology, and undergraduate and postgraduate students of Computer Applications. Students are first exposed to network security principles, organizational policy and security infrastructure, and then drawn into some of the deeper issues of cryptographic algorithms and protocols underlying network security applications. Encryption methods, secret key and public key cryptography, digital signature and other security mechanisms are emphasized. Smart card, biometrics, virtual private networks, trusted operating systems, pretty good privacy, database security, and intrusion detection systems are comprehensively covered. An in-depth analysis of technical issues involved in security management, risk management and security and law is presented. In the third edition, two new chapters—one on Information Systems Security and the other on Web Security—and many new sections such as digital signature, Kerberos, public key infrastructure, software security and electronic mail security have been included. Additional matter has also been added in many existing sections. KEY FEATURES : Extensive use of block diagrams throughout helps explain and clarify the concepts discussed. About 250 questions and answers at the end of the book facilitate fruitful revision of the topics covered. Includes a glossary of important terms. KEY FEATURES : Extensive use of block diagrams throughout helps explain and clarify the concepts discussed. About 250 questions and answers at the end of the book facilitate fruitful revision of the topics covered. Includes a glossary of important terms.

2 months ago
Advertisement
Advertisement
Advertisement
Advertisement