Home | Amazing | Today | Tags | Publishers | Years | Search 
CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)
CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)

CD Features More Than 200 Practice Questions

 

CompTIA® Network+ N10-005 Authorized Exam Cram, Fourth Edition is the perfect study guide to help you pass CompTIA’s new Network+ N10-005 exam. It provides coverage and practice questions for...

Formal Methods and Software Engineering: 6th International Conference on Formal Engineering Methods
Formal Methods and Software Engineering: 6th International Conference on Formal Engineering Methods
Formal engineering methods are changing the way that software systems are developed. With language and tool support, they are being used for automatic code generation, and for the automatic abstraction and checking of implementations. In the future, they will be used at every stage of development: requirements, specification,...
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011
Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011

The 13th IMA Conference on Cryptography and Coding was held at the Lady Margaret Hall, University of Oxford, UK, during December 12–15, 2011. This event was a 25th anniversary celebration of the very successful biennial IMA conference series. Traditionally, the conference has taken place at the Royal Agricultural College,...

Groupware: Design, Implementation, and Use: 9th International Workshop, CRIWG 2003
Groupware: Design, Implementation, and Use: 9th International Workshop, CRIWG 2003

This volume constitutes the proceedings of the 9th International Workshop on Groupware (CRIWG 2003). The conference was held in the city of Autrans, on the spectacular Vercors plateau in the foothills of the French Alps. The organizing committee could not have thought of a better setting to inspire lively discussions and reflection on...

Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing
Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing

This book and its companion volume, LNCS vols. 6145 and 6146, constitute the proceedings of the International Conference on Swarm Intelligence (ICSI 2010) held in Beijing, the capital of China, during June 12-15, 2010. ICSI 2010 was the first gathering in the world for researchers working on all aspects of swarm intelligence, and...

AutoCAD 2011: A Problem-Solving Approach
AutoCAD 2011: A Problem-Solving Approach

AutoCAD, developed by Autodesk Inc., is the most popular PC-CAD system available in the market. Today, over 7 million people use AutoCAD and other AutoCAD based design products. 100% of the Fortune 100 firms are Autodesk customers and 98% of the Fortune 500 firms are Autodesk customers. AutoCAD’s open architecture has allowed...

Functional and Logic Programming: 10th International Symposium, FLOPS 2010
Functional and Logic Programming: 10th International Symposium, FLOPS 2010

This volume contains the proceedings of the 10th International Symposium on Functional and Logic Programming (FLOPS 2010), held in Sendai, Japan, April 19–21, 2010 at Aoba Memorial Hall, Tohoku University.

FLOPS is a forum for research on all issues concerning declarative programming, including functional programming and...

Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies...

Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002

SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a...

Computers and Games: 7th International Conference, CG 2010, Kanazawa, Japan
Computers and Games: 7th International Conference, CG 2010, Kanazawa, Japan

This book contains the papers of the 7th Computer and Games Conference (CG 2010) held in Kanazawa, Japan. The conference took place during September 24–26, 2010 in conjunction with the 15th Computer Olympiad and the 17th World Computer Chess Championship.

The Computer and Games conference series is a major international...

Human-Computer Interaction: Second IFIP TC 13 Symposium, HCIS 2010
Human-Computer Interaction: Second IFIP TC 13 Symposium, HCIS 2010

The IFIP World Computer Congress (WCC) is one of the most important conferences in the area of computer science at the worldwide level and it has a federated structure, which takes into account the rapidly growing and expanding interests in this area. Informatics is rapidly changing and becoming more and more connected to a number of human...

Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy