IBM Worklight Mobile Application Development Essentials
Your move onto mobile devices is simplified when you use IBM Worklight and this user-friendly tutorial. After a guided tour through the components you'll learn how to utilize them to optimize your mobile applications.
About This Book
Develop Mobile Apps that can be deployed on multiple mobile...
Introduction to Cryptography (Undergraduate Texts in Mathematics)
Cryptography is a key technology in electronic security systems.
Modern cryptograpic techniques have many uses, such as to digitally
sign documents, for access control, to implement electronic money,
and for copyright protection. Because of these important uses it is
necessary that users be able to estimate the efficiency and security...
Basic Ship Theory Volume 2, Fifth Edition Rawson and Tupper's Basic Ship Theory, first published in 1968, is widely known as the standard introductory text for naval architecture students, as well as being a useful reference for the more experienced designer.
The fifth edition continues to provide a balance between theory and practice. Volume 2 expands on the material in Volume...
Java Network Programming, (4th Addition)
This practical guide provides a complete introduction to developing network programs with Java. You’ll learn how to use Java’s network class library to quickly and easily accomplish common networking tasks such as writing multithreaded servers, encrypting communications, broadcasting to the local network, and posting data...
Siegenthaler's Differential Diagnosis in Internal Medicine
The present book, Differential Diagnosis in Internal
Medicine, first appeared as a German edition in
1952 and since then has been translated into 10
other languages. Over the past 50 years 19 German
editions have been published, and now the
19th edition of the work, which has become the
classic differential diagnosis textbook, is...