Home | Amazing | Today | Tags | Publishers | Years | Search 
GIS Basics
GIS Basics

Geographical Information Systems (GIS) are computer systems for storing, displaying and analyzing spatial data. The past twenty years have seen a rapid growth in their use in government, commerce and academia, and they can be used for managing a network of utilities, from handling census data through to planning the location of a new...

Joomla!: Visual QuickStart Guide (2nd Edition)
Joomla!: Visual QuickStart Guide (2nd Edition)

Building on the first edition of Joomla!: Visual QuickStart Guide, this task-based guide is the perfect tool for those just starting with Joomla, as well as, seasoned professionals who want to know how to use the latest version of the software to its fullest. It shows how to create, customize, and maintain a dynamic Joomla 1.6 website...

Ethics in Information Technology
Ethics in Information Technology

We are excited to publish the third edition of Ethics in Information Technology. This new edition builds on the success of the previous editions and meets the need for a resource that helps readers understand many of the legal, ethical, and societal issues associated with IT. We have responded to the feedback from our first and second...

TcL Scripting for Cisco IOS (Networking Technology)
TcL Scripting for Cisco IOS (Networking Technology)

A guide to building and modifying Tcl scripts to automate network administration tasks

 

Streamline Cisco network administration and save time with Tcl scripting

Cisco networking professionals are under relentless pressure to...

The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
Whether you’re shopping for clothes from your computer or mobile phone, or selling artworks around the globe, you face a dizzying array of choices and decisions. How do I pay? How do I get paid? What if something goes wrong?

The answer? PayPal.

We are—and will continue to be—the
...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it was unimportant: a quirky mechanism that allowed a handful of students, plus a bunch of asocial, basementdwelling geeks, to visit each other’s home pages dedicated to science, pets, or poetry. Today, it is the platform of choice for writing...
Cryptography and Network Security
Cryptography and Network Security
The Internet, as a worldwide communication network, has changed our daily life in many ways. A new paradigm of commerce allows individuals to shop online. The World Wide Web (WWW) allows people to share information. The E-mail technology conned people in far-flung corners of the world. 'ITiis inevitable evolution has also cre-...
Adobe Business Catalyst: Design full-featured websites without the hassles of development
Adobe Business Catalyst: Design full-featured websites without the hassles of development
The Internet has completely transformed the way products are marketed and sold. Technology is evolving very quickly and businesses are constantly reinventing themselves. Customers want more for their money. They have learned to shop around to find the best value. They compare reviews to purchase the highest-rated items. As the...
Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Smashing WordPress: Beyond the Blog (Smashing Magazine Book Series)
Smashing WordPress: Beyond the Blog (Smashing Magazine Book Series)

Smashing WordPress shows you how to utilize the power of the WordPress platform, and provides a creative spark to help you build WordPress-powered sites that go beyond the obvious. The second edition of Smashing WordPress has been updated for WordPress 3.1+, which includes internal, custom post types, the admin bar, and lots of other...

Advances in Databases and Information Systems: Third East European Conference, ADBIS'99, Maribor, Slovenia,
Advances in Databases and Information Systems: Third East European Conference, ADBIS'99, Maribor, Slovenia,

The 3rd Eastern European Conference on Advances in Databases and Information Systems (ADBIS’99) took place on 13-16- September 1999, in Maribor, Slovenia. It was organized in cooperation with ACM SIGMOD, the Moscow chapter of ACM SIGMOD, Slovenian Society Informatika, and the Slovenian Ministry of Technology.

The aim...

Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy