 |
|
 Algorithms for Visual Design Using the Processing LanguageHow has design changed through the use of computers? Is it still valid to assume that a designer is in control of a design concept? What if there is a lack of predictability over what was intended by the designer and what came out on the computer’s screen? Is computer programming necessary in design today?
This book is about... |  |  Cross-border Internet Dispute ResolutionThe internet has the potential to increase the number of cross-border disputes between a wide range of different users. For many internet disputes, the use of Online Dispute Resolution (ODR) becomes critical. ODR uses information technology (such as expert systems) and internet communication applications (such as webforms or web filing platforms)... |  |  Satellite Remote Sensing for ArchaeologyIt is my sincere hope that students, professional archaeologists, archaeological researchers and all people fascinated by the potential for satellite remote sensing in archaeology will find this book useful. It is, more than anything else, a product of my thinking back to my graduate student days, and what I wish had existed then to help me get... |
|
|
 Property Management Kit For Dummies (Book & CD)Thinking about becoming a landlord? Property Management Kit For Dummies, 2nd Edition gives you proven strategies for establishing and maintaining rental properties, be they single family or multi-resident. You'll see how to prepare and promote your properties, select tenants, handle repairs, avoid costly mistakes and legal... |  |  Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fastZimbra is open-source server and client software for messaging and collaboration: email, group calendaring, contacts, and web document management and authoring. The Zimbra server is available for Linux, Mac OS X, appliances, and virtualization platforms. The Zimbra Web 2.0 Ajax client runs on Firefox, Safari, and IE, and features easy... |  |  |
|
 Algorithmic Cryptanalysis (Cryptography and Network Security)Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,... |  |  |  |  |
|
Result Page: 1005 1004 1003 1002 1001 1000 999 998 997 996 995 994 993 992 991 990 989 988 987 |