Home | Amazing | Today | Tags | Publishers | Years | Search 
Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Introducing HTML5 Game Development
Basic Neurochemistry, Seventh Edition: Molecular, Cellular and Medical Aspects
Basic Neurochemistry, Seventh Edition: Molecular, Cellular and Medical Aspects

This Seventh Edition of Basic Neurochemistry: Molecular, Cellular and Medical Aspects is appearing near to the 50th anniversary of the founding of neurochemistry as a discipline. This seems an appropriate time to examine the progress of neurochemistry and of this book. To make this brief, we will look at only two topics, which may be...

iPhone User Interface Cookbook
iPhone User Interface Cookbook

The incredible growth rates for the iPhone, iPod touch, and iPad have pushed consumers to a new "App" economy, with developers racing to the platform. Mobile touch-centric interfaces vary greatly from traditional computing platforms, and programmers as well as designers must learn to adapt to the new form-factor.

...

Oracle BI Publisher 11g: A Practical Guide to Enterprise Reporting
Oracle BI Publisher 11g: A Practical Guide to Enterprise Reporting

In the last 15 years, some of us have witnessed mail becoming e-mail, grocery stores becoming www.store, and step-by-step technology becoming part of our daily life. Technology development has radically changed the enterprise's way of doing business. First, daily tasks such as sales, client, and vendor management became...

Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing
Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing

This book and its companion volume, LNCS vols. 6145 and 6146, constitute the proceedings of the International Conference on Swarm Intelligence (ICSI 2010) held in Beijing, the capital of China, during June 12-15, 2010. ICSI 2010 was the first gathering in the world for researchers working on all aspects of swarm intelligence, and...

Beginning iOS Game Center and Game Kit: For iPhone, iPad, and iPod touch
Beginning iOS Game Center and Game Kit: For iPhone, iPad, and iPod touch

As the iOS platform begins to become more popular, developers are looking for ways to add additional polish and functionality to their software. Game Center and Game Kit provide an easy path for adding advanced functionality to your software with only a fraction of the work in the past.

Beginning iOS Game Center and Game...

The Handbook of Human Factors in Web Design (Human Factors and Ergonomics)
The Handbook of Human Factors in Web Design (Human Factors and Ergonomics)

The Handbook of Human Factors in Web Design covers basic human factors issues relating to screen design, input devices, and information organization and processing, as well as addresses newer features which will become prominent in the next generation of Web technologies. These include multimodal interfaces, wireless capabilities,...

Standard Handbook of Petroleum and Natural Gas Engineering: Volume 1
Standard Handbook of Petroleum and Natural Gas Engineering: Volume 1

This petroleum and natural gas engineering two-volume handbook is written in the spirit of the classic handbooks of other engineering disciplines. The two volumes reflect the importance of the industry its engineers serve (i.e., Standard and Poor's shows that the fuels sector is the largest single entity in the gross domestic...

Configuring and Tuning Databases on the Solaris Platform
Configuring and Tuning Databases on the Solaris Platform

Modern corporations demand a high level of service from their IT environ- ments. Today's successful datacenter architectures consist of multiple tiers that use well-tuned and high-performance servers at every level.

Sun refers to this as the "end-to-end architecture." Typical tiers include powerful database...

Financial Cryptography and Data Security: 12th International Conference, FC 2008
Financial Cryptography and Data Security: 12th International Conference, FC 2008

I am are very happy to have taken part in the 12th Financial Cryptography and Data Security Conference (FC 2008). Due to the recent growth in the number of security and cryptography venues, the competition for high-quality submissions has been on the rise. Despite that, the continued success of FC is attested by the research...

Electric Power Transformer Engineering, Second Edition
Electric Power Transformer Engineering, Second Edition

It is appropriate that I first acknowledge my appreciation to Professor Leo Grigsby for inviting me to prepare the chapter on power transformers for the first edition (2001) of his now very popular Electric Power Engineering Handbook. From this evolved the recognition that two chapters from the 2001 Handbook, those for (1) substations...

Result Page: 1837 1836 1835 1834 1833 1832 1831 1830 1829 1828 1827 1826 1825 1824 1823 1822 1821 1820 1819 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy