Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

iPhone JavaScript Cookbook
iPhone JavaScript Cookbook

Written in a cookbook style, this book offers solutions using a recipe-based approach. Each recipe contains step-by-step instructions followed by an analysis of what was done in each task and other useful information. The cookbook approach means you can dive into whatever recipes you want in no particular order. This book is for web...

Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
The availability of increased computational power and the proliferation of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information. As a result, the problem of copyright protection has attracted the interest of the worldwide scientific and business communities. The most...
Elementary and Intermediate Algebra: Graphs and Models (4th Edition)
Elementary and Intermediate Algebra: Graphs and Models (4th Edition)

The Bittinger Graphs and Models Series helps readers learn algebra by making connections between mathematical concepts and their real-world applications. Abundant applications, many of which use real data, offer students a context for learning the math. The authors use a variety of tools and techniques—including graphing...

The Nordic Diet: Using Local and Organic Food to Promote a Healthy Lifestyle
The Nordic Diet: Using Local and Organic Food to Promote a Healthy Lifestyle
The Nordic Diet is all about eating locally sourced seasonal ingredients in a balanced diet of protein, carbohydrates, and beneficial fats. The traditional diet of Northern Europe emphasizes quality homemade and homegrown food—with an attempt at moving away from processed foods—and consists of a wide variety of grains,...
Digital Signal Processing with Examples in MATLAB® (Electrical Engineering & Applied Signal Processing Series)
Digital Signal Processing with Examples in MATLAB® (Electrical Engineering & Applied Signal Processing Series)

Based on fundamental principles from mathematics, linear systems, and signal analysis, digital signal processing (DSP) algorithms are useful for extracting information from signals collected all around us. Combined with today’s powerful computing capabilities, they can be used in a wide range of application areas, including...

Software Language Engineering: Third International Conference, SLE 2010
Software Language Engineering: Third International Conference, SLE 2010

We are pleased to present the proceedings of the third international conference on Software Language Engineering (SLE 2010). The conference was held in Eindhoven, the Netherlands during October 12–13, 2010. It was co-located with the ninth international conference on Generative Programming and Component Engineering (GPCE) and the...

Working with Microsoft Dynamics CRM 2011
Working with Microsoft Dynamics CRM 2011

We love Microsoft Dynamics CRM 2011, and we hope that by the time you finish reading this book, you will love Microsoft Dynamics CRM, too. We understand that you might be skeptical about the possibility of falling for a piece of software, but we want you to know right up front that our goal is to show you all of the wonderful and...

Cisco Firewalls (Networking Technology: Security)
Cisco Firewalls (Networking Technology: Security)

Networks today have outgrown exponentially both in size and complexity, becoming more multifaceted and increasingly challenging to secure. The blueprint of a core network requires a strong foundation, which can be simply provided with an integrated firewall architecture cemented at the core of the system. Today, the firewall has become...

Agile Business Rule Development: Process, Architecture, and JRules Examples
Agile Business Rule Development: Process, Architecture, and JRules Examples

According to Wordnet, a rule is “a principle or condition that customarily governs behavior” or “a prescribed guide for conduct or action.” Businesses, and organizations in general, operate under a number of rules: rules about what services to offer and to whom; rules about how much to charge for those services;...

Cfengine 3 Beginner's Guide
Cfengine 3 Beginner's Guide
This book starts off with step-by-step instructions for installing and configuring the CFEngine server and clients, and then moves on to configuring systems using CFEngine scripts. The author then walks you through the policy decision flow as well as conducting system and security audits.

This is followed by
...
iOS 5 Core Frameworks: Develop and Design: Working with graphics, location, iCloud, and more
iOS 5 Core Frameworks: Develop and Design: Working with graphics, location, iCloud, and more

Everyone seems to have an opinion as to why their favorite mobile platform is better than the others. Some prefer iOS, others choose Android—each platform has its pros and cons. For me, however, iOS stands above the rest in large part due to its use of powerful native frameworks.

Sure, frameworks and...

unlimited object storage image
Result Page: Previous 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy