Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mobile Authentication: Problems and Solutions (SpringerBriefs in Computer Science)
Mobile Authentication: Problems and Solutions (SpringerBriefs in Computer Science)

Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and...

The Subtle Art of Strategy: Organizational Planning in Uncertain Times
The Subtle Art of Strategy: Organizational Planning in Uncertain Times
"Before Jack Welch there was Ian Wilson. In his years at GE, Wilson pioneered the concept that strategists must learn to plan in the face of uncertainty....In this brilliant volume he summarizes the strategic state-of-the-art in terms that are as clear as they are practical. Nobody has said it better." - James O'Toole University of...
The Origins of Language: Unraveling Evolutionary Forces
The Origins of Language: Unraveling Evolutionary Forces
Developments in cognitive science indicate that human and nonhuman primates share a range of behavioral and physiological characteristics that speak to the issue of language origins. This volume has three major themes, woven throughout the chapters. First, it is argued that scientists in animal behavior and anthropology need to move beyond...
Cody's Data Cleaning Techniques Using SAS, Second Edition
Cody's Data Cleaning Techniques Using SAS, Second Edition
Although this book is titled Cody’s Data Cleaning Techniques Using SAS, I hope that it is more than that. It is my hope that not only will you discover ways to detect data errors, but you will also be exposed to some DATA step programming techniques and SAS procedures that might be new to you.

I have been teaching a two-day data
...
Logical Foundations of Computer Science: International Symposium, LFCS 2007
Logical Foundations of Computer Science: International Symposium, LFCS 2007

The Symposium on Logical Foundations of Computer Science series provides a forum for the fast-growing body of work in the logical foundations of computer science, e.g., those areas of fundamental theoretical logic related to computer science. The LFCS series began with “Logic at Botik,” Pereslavl-Zalessky, 1989, which was...

Exploratory Programming for the Arts and Humanities (MIT Press)
Exploratory Programming for the Arts and Humanities (MIT Press)

This book introduces programming to readers with a background in the arts and humanities; there are no prerequisites, and no knowledge of computation is assumed. In it, Nick Montfort reveals programming to be not merely a technical exercise within given constraints but a tool for sketching, brainstorming, and inquiring about important topics....

Engineering a Compiler
Engineering a Compiler
The proliferation of processors, environments, and constraints on systems has cast compiler technology into a wider variety of settings, changing the compiler and compiler writer's role. No longer is execution speed the sole criterion for judging compiled code. Today, code might be judged on how small it is, how much power it consumes, how well it...
Beginning Lua with World of Warcraft Add-ons
Beginning Lua with World of Warcraft Add-ons

If you play World of Warcraft, chances are you know what Deadly Boss Mods is: it's the most widely downloaded modification available for WoW, considered required software for many professional raid guilds, and arguably the most popular modern video game mod in history.

Paul Emmerich, the author of Deadly Boss Mods, will...

Undercover User Experience Design (Voices That Matter)
Undercover User Experience Design (Voices That Matter)

Once you catch the user experience bug, the world changes. Doors open the wrong way, websites don't work, and companies don't seem to care. And while anyone can learn the UX remedies usability testing, personas, prototyping and so on unless your organization 'gets it', putting them into practice is trickier. Undercover User...

Scrum in Action
Scrum in Action
While there are some good books on Scrum out there, we believe none of them deal with all the essentials a software project team needs to know in order to begin and complete a Scrum software project within corporate constraints (by corporate constraints, we mean in companies where Scrum or Agile has not been successfully...
Data Mining: A Heuristic Approach
Data Mining: A Heuristic Approach

The last decade has witnessed a revolution in interdisciplinary research where the boundaries of different areas have overlapped or even disappeared. New fields of research emerge each day where two or more fields have integrated to form a new identity. Examples of these emerging areas include bioinformatics (synthesizing biology with...

The Game Animator's Guide to Maya
The Game Animator's Guide to Maya
The Ultimate Resource for Professional Game Animators

Game animation is a demanding art. Not only do you have to deliver realistic, beautiful animations, but you have to do so under strict real-time, video-game constraints. The Game Animator's Guide to Maya is your focused resource for using Maya to create...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy