Home | Amazing | Today | Tags | Publishers | Years | Search 
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Adobe Dreamweaver CS5: Comprehensive (Shelly Cashman Series)
Adobe Dreamweaver CS5: Comprehensive (Shelly Cashman Series)
The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud of the fact that our previous Dreamweaver books have been so well received. With each new edition of our Dreamweaver books, we make signifi cant improvements based on the software and comments made by instructors and students. For this...
Microsoft Visual Basic 2010 for Windows, Web, Office, and Database Applications: Comprehensive (Shelly Cashman Series)
Microsoft Visual Basic 2010 for Windows, Web, Office, and Database Applications: Comprehensive (Shelly Cashman Series)

The Shelly Cashnian Series® offers the finest textbooks in computer education-This .Microsoft Visual Basic 2010 book utilizes an innovative step-bv-step pedagogy,  which integrates demonstrations of professional-quality programs with in-depth discussions of programming concepts and techniques and opportunities for hands-on practice...

Sams Teach Yourself iOS 5 Application Development in 24 Hours (3rd Edition) (Sams Teach Yourself -- Hours)
Sams Teach Yourself iOS 5 Application Development in 24 Hours (3rd Edition) (Sams Teach Yourself -- Hours)

In less than half a decade, the iOS platform has changed the way that we, the public, think about our mobile computing devices. Only a few years ago, we were thrilled by phones with postage-stamp-sized screens, tinny audio, built-in tip calculators, and text-based web browsing. Times have indeed...

Expert Oracle Application Express Plugins: Building Reusable Components (Expert Apress)
Expert Oracle Application Express Plugins: Building Reusable Components (Expert Apress)

Expert Oracle Application Express Plugins is your “go to” book on the groundbreaking plugin architecture introduced in Oracle Application Express 4.0. Using the new APEX functionality, you can create well-packaged, documented, reusable components and reliably leverage your coding investments across many applications....

Pervasive Collaborative Networks: IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES
Pervasive Collaborative Networks: IFIP TC 5 WG 5.5 Ninth Working Conference on VIRTUAL ENTERPRISES
In earlier definitions, organization’s competency is mainly addressing its capabilities, for example Gallon (Gallon et al, 1995) defines competency as “aggregation of capabilities, where synergy that is created has sustainable value and broad applicability”. However participation of VBE members in general VBE...
Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation
Communicating the User Experience: A Practical Guide for Creating Useful UX Documentation
THE ROLE OF a user experience consultant, and specifi cally the user-centered design process, is to help guide and shape the development of products and services based on what the user understands and requires. To do this, the consultant needs to be a facilitator and communicator, ensuring that the right user information is...
HTML, XHTML, and CSS: Introductory (Shelly Cashman)
HTML, XHTML, and CSS: Introductory (Shelly Cashman)
The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud of the fact that our previous HTML books have been so well received. With each new edition of our HTML books, we have made signifi cant improvements based on the comments made by instructors and students. The HTML, XHTML, and CSS, Sixth...
IT Audit, Control, and Security (Wiley Corporate F&A)
IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has changed in information technology (IT) auditing since we published our first edition of this book when we were then called Computer Auditors. Back in those days, traditional mainframe or legacy computer systems were still common, we had difficulty envisioning...
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Penetration testers are faced with a combination of firewalls, intrusion detection systems, host-based protection, hardened systems, and teams of knowledgeable analysts that pour over data collected by their security information management systems. In an environment such as this, simply running automated tools will typically...
iPhone Location Aware Apps by Example: Beginners Guide
iPhone Location Aware Apps by Example: Beginners Guide
iPhone Location Aware Apps Beginner's Guide is probably the first book from any technical publisher that teaches you to build real world applications (five of them). That's a bold step from PacktPub - by undertaking more lively practical examples, rather than 400 pages of text! The book lays emphasis on location services, due to the...
Ambient Intelligence - Software and Applications: 3rd International Symposium on Ambient Intelligence
Ambient Intelligence - Software and Applications: 3rd International Symposium on Ambient Intelligence

Ambient Intelligence (AmI) is a recent paradigm emerging from Artificial Intelligence (AI), where computers are used as proactive tools assisting people with their day-to-day activities, making everyone’s life more comfortable. Another main concern of AmI originates from the human computer interaction domain and focuses on offering ways...

Result Page: 795 794 793 792 791 790 789 788 787 786 785 784 783 782 781 780 779 778 777 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy