Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

How to Develop a Perfect Memory
How to Develop a Perfect Memory

This manual explains Dominic O'Brien's system intended to help the reader remember names, faces, telephone numbers, pass exams, learn languages, win at Trivial Pursuit and clean up at the blackjack table. O'Brien is able to memorize the sequence of 36 shuffled packs of cards using his method.

...
Travel Behaviour Modification (TBM) Program for Adolescents in Penang Island: Intervention Ideas to Promote Sustainable Transport (SpringerBriefs on Case Studies of Sustainable Development)
Travel Behaviour Modification (TBM) Program for Adolescents in Penang Island: Intervention Ideas to Promote Sustainable Transport (SpringerBriefs on Case Studies of Sustainable Development)

This book discusses the potential of travel behaviour modification (TBM) as a persuasive tool to promote low-carbon mobility among adolescents on Penang Island by highlighting the role of bus usage in a sustainable urban lifestyle. The participants of the Reduce Carbon Footprint Campaign, which aimed to create...

Game Programming Gems 8
Game Programming Gems 8

Welcome to the eighth edition of the Game Programming Gems series, started by Mark DeLoura in 2000. The first edition was inspired by Andrew Glassner‘s popular Graphics Gems series. Since then, other Gems series have started, including AI Gems and a new series focused on the capabilities of programmable graphics, the ShaderX series....

The Psychiatric Interview (Practical Guides in Psychiatry)
The Psychiatric Interview (Practical Guides in Psychiatry)

The psychiatric interview is your window into the mind of your patient. With this practical, how-to handbook, you'll examine each aspect of the psychiatric interview in detail. Your journey begins with the general principles essential to effective interviewing—including techniques for approaching threatening topics,...

Getting Started with Raspberry Pi Zero
Getting Started with Raspberry Pi Zero

Key Features

  • Get started with Raspberry Pi Zero and put all of its exciting features to use
  • Create fun games and programs with little or no programming experience
  • Learn to use this super-tiny PC to control hardware and software for work, play, and everything else

Book...

Ignore Everybody: and 39 Other Keys to Creativity
Ignore Everybody: and 39 Other Keys to Creativity

When Hugh MacLeod was a struggling young copywriter living in a YMCA, he started to doodle on the backs of business cards while sitting at a bar. Those cartoons eventually led to a popular blog-gapingvoid.com-and a reputation for pithy insight and humor, in both words and pictures. MacLeod has opinions on everything from marketing to the...

Deep in the Shadows: Undercover in the Ruthless World of Human Smuggling
Deep in the Shadows: Undercover in the Ruthless World of Human Smuggling

"You have a lot of enemies, Hipolito. I heard rumors in jail that some of the people you busted are going to try to kill you, so you better watch yourself." U.S. Special Agent Hipolito Acosta had put lots of thugs in jail, but the death threat from an imprisoned convict was still a shock.


Acosta recounts
...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Algorithms for Image Processing and Computer Vision
Algorithms for Image Processing and Computer Vision

Humans still obtain the vast majority of their sensory input through their visual system, and an enormous effort has been made to artificially enhance this sense. Eyeglasses, binoculars, telescopes, radar, infrared sensors, and photomultipliers all function to improve our view of the world and the universe. We even have telescopes in orbit...

Linux Multimedia Guide
Linux Multimedia Guide

Linux is increasingly popular among computer enthusiasts of all types, and one of the applications where it is flourishing is multimedia. Take a low-cost hardware platform and add the Linux operating system, which really exploits its speed, and you have a great host for developing multimedia applications. These often can be ported to...

Vector Games Math Processors (Wordware Game Math Library)
Vector Games Math Processors (Wordware Game Math Library)
Vector math processors have, up until recently, been in the domain of
the supercomputer, such as the Cray computers. Computers that have
recently joined this realm are the Apple Velocity Engine (AltiVec)
coprocessor of the PowerPC G4 in Macintosh and UNIX computers, as
well as IBM’s Power PC-based Gekko used in the
...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy