Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
Programming the iPhone User Experience
Programming the iPhone User Experience
Apple's iPhone and iPod Touch not only feature the world's most powerful mobile operating system, they also usher in a new standard of human-computer interaction through gestural interfaces and multi-touch navigation. This book provides you with a hands-on, example-driven tour of UIKit, Apple's user interface toolkit, and includes common design...
Ghosts of Atlantis: How the Echoes of Lost Civilizations Influence Our Modern World
Ghosts of Atlantis: How the Echoes of Lost Civilizations Influence Our Modern World
An intensive investigation into the evidence for a forgotten fountainhead of civilization lost at the end of the last ice age

• Reveals evidence of advanced ancient technology, anomalous ancient maps, time travel, crystal science, ancient Armageddon, and Atlantis in the Bible

• Explores the true
...
Doing Research in the Real World
Doing Research in the Real World
"If you are interested in a balanced overview of both quantitative and qualitative research methods, if you are considering doing research at work or as a student, or if you are looking for a contemporary book on how research can be done in business settings, David Gray's Doing research in the real world  would be an excellent...
Chromium Doped TiO2 Sputtered Thin Films: Synthesis, Physical Investigations and Applications (SpringerBriefs in Applied Sciences and Technology)
Chromium Doped TiO2 Sputtered Thin Films: Synthesis, Physical Investigations and Applications (SpringerBriefs in Applied Sciences and Technology)

This book presents co-sputtered processes ways to produce chrome doped TiO2 thin films onto various substrates such as quartz, silicon and porous silicon. Emphasis is given on the link between the experimental preparation and physical characterization in terms of Cr content. Moreover, the structural, optical and optoelectronic...

Information Flow and Knowledge Sharing, Volume 2 (Capturing Intelligence)
Information Flow and Knowledge Sharing, Volume 2 (Capturing Intelligence)
Our goal in this book is to present our conceptualization of information and of knowledge, and to clarify the distinctions between these two concepts. Indeed, they are more than concepts. These two words convey a plurality of meanings and have a deep character that goes beyond pure conceptualizations. By emphasizing their distinctions, we do not...
Nurse's Pocket Guide: Diagnoses, Prioritized Interventions, and Rationale 10th Editions
Nurse's Pocket Guide: Diagnoses, Prioritized Interventions, and Rationale 10th Editions

The American Nurses Association (ANA) Social Policy Statement of 1980 was the first to define nursing as the diagnosis and treatment of human responses to actual and potential health problems. This definition, when combined with the ANA Standards of Practice, has provided impetus and support for the use of nursing diagnosis. Defining nursing...

Salivary Gland Cytopathology (Essentials in Cytopathology)
Salivary Gland Cytopathology (Essentials in Cytopathology)

Salivary gland cytopathology is one of the most challenging areas of diagnostic cytology. Salivary Gland Cytopathology will use a simplified algorithmic approach based upon differential diagnostic groups to cover practical aspects of diagnosing common as well as challenging salivary gland lesions.

This volume published in the...

Numerical Techniques in Electromagnetics with MATLAB
Numerical Techniques in Electromagnetics with MATLAB

Despite the dramatic growth in the availability of powerful computer resources, the EM community lacks a comprehensive text on the computational techniques used to solve EM problems. The first edition of Numerical Techniques in Electromagnetics filled that gap and became the reference of choice for thousands of engineers,...

Programming the Perl DBI
Programming the Perl DBI
The DBI is the standard database interface for the Perl programming language. The DBI is databaseindependent, which means that it can work with just about any database, such as Oracle, Sybase, Informix, Access, MySQL, etc.

While we assume that readers of this book have some experience with Perl, we don't assume much familiarity with
...
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition
Deep Learning with TensorFlow: Explore neural networks and build intelligent systems with Python, 2nd Edition

Delve into neural networks, implement deep learning algorithms, and explore layers of data abstraction with the help of TensorFlow.

Key Features

  • Learn how to implement advanced techniques in deep learning with Google's brainchild, TensorFlow
  • Explore deep neural...
Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)
Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy