Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algorithmic Cryptanalysis (Cryptography and Network Security)
Algorithmic Cryptanalysis (Cryptography and Network Security)
Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,...
Software Architecture Knowledge Management: Theory and Practice
Software Architecture Knowledge Management: Theory and Practice

A software architecture manifests the major early design decisions, which determine the system’s development, deployment and evolution. Thus, making better architectural decisions is one of the large challenges in software engineering. Software architecture knowledge management is about capturing practical experience and translating it...

Stop Staring: Facial Modeling and Animation Done Right
Stop Staring: Facial Modeling and Animation Done Right

Animation has got to be the greatest job in the world. When you get started, you just want to do everything, all at once, but can’t decide on one thing to start with. You animate a walk, you animate a run, maybe even a skip or jump, and it’s all gratifying in a way people outside of animation may never be lucky enough to...

SAP Solution Manager (3rd Edition)
SAP Solution Manager (3rd Edition)

SAP Solution Manager has quickly become one of the most important and all-encompassing tools needed by clients today. But what can it really do for you? How can it help you with project implementation or operation of the final solution? What is important for users to know, whether they are an administrator or project team member? What...

R Deep Learning Essentials
R Deep Learning Essentials

Key Features

  • Harness the ability to build algorithms for unsupervised data using deep learning concepts with R
  • Master the common problems faced such as overfitting of data, anomalous datasets, image recognition, and performance tuning while building the models
  • Build models relating to neural...
MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft Internet Security and Acceleration Server 2004 (Pro-Certification)
MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft Internet Security and Acceleration Server 2004 (Pro-Certification)
Welcome to MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft Internet Security and Acceleration (ISA) Server 2004. This training kit is designed to provide the knowledge you need to pass the 70-350 certification exam. More importantly, this training kit also provides you with the knowledge and skills required to implement,...
Java Message Service
Java Message Service
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
Java How to Program (4th Edition)
Java How to Program (4th Edition)
Welcome to Java How to Program, Fourth Edition and the exciting world of programming with the Java™ 2 Platform, Standard Edition. This book is by an old guy and a young guy. The old guy (HMD; Massachusetts Institute of Technology 1967) has been programming and/or teaching programming for 40 years. The young guy (PJD; MIT 1991) has been...
Microsoft Office Live For Dummies (Computer/Tech)
Microsoft Office Live For Dummies (Computer/Tech)
Automate common tasks like managing projects, customers, and documents

The fun and easy way to share your data online and grow your business

Want to make Office Live work for you? Now you can get up and running quickly in all the basics with this nuts-and-bolts guide. From creating a Web site...

Bike, Scooter, and Chopper Projects for the Evil Genius
Bike, Scooter, and Chopper Projects for the Evil Genius
Greetings! Glad that you decided to take an interest in the best hobby you will ever know! Maybe you are already a seasoned garage hacker and have decided to build a few of the projects from this book, adding your own special modifications, of course. Or, maybe you have never thought about taking an angle grinder to a working bicycle, chopping it...
Apache Struts 2 Web Application Development
Apache Struts 2 Web Application Development

Struts 2.1 is a modern, extensible, agile web application framework suitable for both small- and large-scale web applications.

The book begins with a comprehensive look at Struts 2.1 basics, interspersed with detours into more advanced development topics. You'll learn about configuring Struts 2.1 actions, results, and interceptors via...

Technology-Supported Environments for Personalized Learning: Methods and Case Studies (Premier Reference Source)
Technology-Supported Environments for Personalized Learning: Methods and Case Studies (Premier Reference Source)

Responding to the specific needs of each student, personalized learning has the potential to refocus education on the individual rather than the institution. Technology-Supported Environments for Personalized Learning: Methods and Case Studies explores the metaphor of anytime and anywhere individual education as well as the idea of...

unlimited object storage image
Result Page: 273 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy