Home | Amazing | Today | Tags | Publishers | Years | Search 
Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Algorithms in Modern Mathematics and Computer Science: Proceedings, Urgench
Algorithms in Modern Mathematics and Computer Science: Proceedings, Urgench

Some TIME ago a group of mathematicians and computer scientists (including the editors of this volume) thought of making a scientific pilgrimage to the birthplace of al-Khw&rizmf, the outstanding ninth-century mathematician who gave his name to the word "algorithm". As his name indicates, al-Khwarizmi came from the Khorezm...

Advances in Grid and Pervasive Computing: 6th International Conference
Advances in Grid and Pervasive Computing: 6th International Conference

the emerging areas of grid computing, cloud computing, and pervasive computing. The 6th International Conference on Grid and Pervasive Computing, GPC 2011, was held in Oulu, Finland, during May 11-13, 2011. This volume contains the full papers that were presented at the conference. This program was preceded by one day of workshops, a...

Introduction to Embedded Systems: A Cyber-Physical Systems Approach
Introduction to Embedded Systems: A Cyber-Physical Systems Approach

The most visible use of computers and software is processing information for human consumption. We use them to write books (like this one), search for information on the web, communicate via email, and keep track of financial data. The vast majority of computers in use, however, are much less visible. They run the engine, brakes,...

Groupware: Design, Implementation, and Use: 9th International Workshop, CRIWG 2003
Groupware: Design, Implementation, and Use: 9th International Workshop, CRIWG 2003

This volume constitutes the proceedings of the 9th International Workshop on Groupware (CRIWG 2003). The conference was held in the city of Autrans, on the spectacular Vercors plateau in the foothills of the French Alps. The organizing committee could not have thought of a better setting to inspire lively discussions and reflection on...

Combinatorial Algorithms: 22th International Workshop, IWOCA 2011
Combinatorial Algorithms: 22th International Workshop, IWOCA 2011

This volume contains the papers presented at IWOCA 11: the 22nd International

Workshop on Combinatorial Algorithms
 
The 22nd IWOCA was held July 20–22, 2011 on the green and spacious campus of the University of Victoria (UVic), itself located on green and spacious Vancouver...
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

One of the most gripping yet improbable stories spawned by the computer revolution, Hacker Crocker is a classic American-dream success story set on the razor edge of high technology. Ejovi Nuwere takes the reader on the roller-coaster ride of his extraordinary life, from the bullet-riddled, drugged-out streets of one of America's...

UMTS Networks: Architecture, Mobility and Services
UMTS Networks: Architecture, Mobility and Services
The world's first public GSM call was made on 1st July 1991 in a city park of Helsinki, Finland. That event is now regarded as the birthday of the second generation mobile telephony. GSM has been an overwhelming success, which was difficult to predict at that early stage. In the past 10 years GSM has become a truly global...
Maran Illustrated Dog Training
Maran Illustrated Dog Training

Produced by the award-winning maranGraphics Group, Maran's Illustrated Guide to Dog Training is a valuable resource to a wide range of readers-from individuals picking up their first puppy to those who are looking to eliminate their pet's annoying behaviors. Instead of describing the myriad ways to perform each task, Maran's...

Brodeur: Beyond the Crease
Brodeur: Beyond the Crease
THIS PREFACE IS BEING WRITTEN en route to London for my yearly pilgrimage to the All England Lawn Tennis and Croquet Club for The Championships, otherwise known as Wimbledon. This trip has become an annual opportunity to reflect upon the latest season of hockey, the sport that usually commands the bulk of my professional...
Net Locality: Why Location Matters in a Networked World
Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk with crowds of anonymous people. He sees skyscrapers and signage extending to the horizon. There is a lot going on – people talking, walking, playing, fighting, screaming, driving, and smiling. He sees a coffee shop that excites his interest. He pulls...
Adobe Edge Preview 5: The Missing Manual
Adobe Edge Preview 5: The Missing Manual
It may be hard to imagine, but once upon a time, pages on the World Wide Web didn’t have pictures, let alone animations, videos, and interactive graphics. All these elements were added through trial, error, debate, and debunk. Changes came when brave souls (like you) forged ahead and made things work with the...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy