Home | Amazing | Today | Tags | Publishers | Years | Search 
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

A company’s most important asset next to its people is its information. This information includes intellectual property, company financial information, confidential employee information, customer information, and so much more. Company information may be stored in databases, spreadsheets, flat files, and so on. Loss of...

Handbook of Pattern Recognition & Computer Vision
Handbook of Pattern Recognition & Computer Vision

The area of pattern recognition and computer vision, after over 35 years of continued development, has now reached its maturity. The theories, techniques and algorithms are mostly well developed. There are a number of applications which are still being explored. New approaches motivated by applications and new computer architectures...

Web Design and Marketing Solutions for Business Websites
Web Design and Marketing Solutions for Business Websites

The Internet encompasses all types of websites, from social media monoliths to individual blogs, from Justin Timberlake fan sites to Fortune 500 businesses. Everyone has a voice, and the medium has become the ultimate level playing field for those seeking to interact with the world through an always-on, instantly available, nearly...

Business Process Model and Notation: Third International Workshop, BPMN 2011
Business Process Model and Notation: Third International Workshop, BPMN 2011

The Business Process Model and Notation (BPMN) has seen a huge uptake in both academia and industry over the past years. It is seen by many as the de facto standard for business process modeling and has become very popular with business analysts, tool vendors and end users. As of version 2.0, the BPMN contains a comprehensive set of...

Beginning PhoneGap (Wrox Programmer to Programmer)
Beginning PhoneGap (Wrox Programmer to Programmer)

THE WORLD OF MOBILE APP DEVELOPMENT is changing rapidly, and frameworks like PhoneGap represent an important step in broadening that world to a very large audience of experienced web developers. With PhoneGap, you can now transfer some (if not most) of your knowledge and skills from the web world to the mobile app world.

This...

Switching to a Mac Portable Genius
Switching to a Mac Portable Genius

The stats tell us that people are switching from Windows to the Mac in record numbers, but those stats don’t tell us why. Perhaps it’s because Windows users would like to actually enjoy using a computer for a change. Perhaps it’s because Macs just work: you take them out of the box, plug them in, and within minutes...

Pro Android 4 (Professional Apress)
Pro Android 4 (Professional Apress)

Pro Android 4 shows you how to build real-world and fun mobile apps using the new Android SDK 4 (Ice Cream Sandwich), which unifies Gingerbread for smartphones, Honeycomb for tablets and augments further with Google TV and more. This Android 4 book updates the best selling Pro Android 3 and covers everything...

Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011
Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011

It was a real pleasure to have taken part in organizing the 10th International Conference on Cryptography and Network Security (CANS 2011). It was held during December 10–12, 2011, at the International Asia Pacific Convention Center in Sanya, on the subtropical island of Hainan (China). CANS 2011 was sponsored by the National...

Research in Systems Analysis and Design: Models and Methods: 4th SIGSAND/PLAIS EuroSymposium 2011
Research in Systems Analysis and Design: Models and Methods: 4th SIGSAND/PLAIS EuroSymposium 2011

Systems analysis and design (SAND) has been the central field of research and education in the area of management information systems (MIS) or, as it is called more frequently in Europe, business informatics, almost from the time of its origins. SAND continuously attracts the attention of both academia and business. The rapid progress...

Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010
Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010

These proceedings contain the papers presented at the 8th Internationl Symposium on Automated Technology for Verification and Analysis held during September 21–24, 2010 in Singapore. The primary objective of the ATVA conferences remains the same: to exchange and promote the latest advances of state-of-the-art research on...

Unity 3.x Game Development Essentials
Unity 3.x Game Development Essentials

When we began creating Unity, we were just three programmers working on a beautiful little game. There weren't any good game engines that one could license without putting down wads of cash, so we created our own. We eventually decided that we enjoyed the challenge of making great tools even more than making games, and after some soul...

Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan, China
Web Information Systems and Mining: International Conference, WISM 2011, Taiyuan, China

The 2011 International Conference on Web Information Systems and Mining

(WISM 2011) was held during September 24–25, 2011 in Taiyuan, China. WISM 2011 received 472 submissions from 20 countries and regions. After rigorous reviews, 112 high-quality papers were selected for publication in the WISM...
Result Page: 298 297 296 295 294 293 292 291 290 289 288 287 286 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy