Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Modelling Urban Development with Geographical Information Systems and Cellular Automata
Modelling Urban Development with Geographical Information Systems and Cellular Automata
Urban development and migration from rural to urban areas are impacting prime agricultural land and natural landscapes, particularly in the less developed countries. These phenomena will persist and require serious study by those monitoring global environmental change. To address this need, various models have been devised to analyze urbanization...
Tomcat 6 Developer's Guide
Tomcat 6 Developer's Guide
While Tomcat is one of the most popular servlet containers, its inner workings still remain a mystery to many developers. If you only have a superficial familiarity of how this container actually functions, much of its power remains untapped and underutilized. This book will provide you with all that you need to undertand how to effectively use...
Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools
Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools

Recently, the rapid and fundamental advances in computing technologies have been driving the role and scope of software systems to a new level. A number of new types of software systems are emerging, among which service based systems, cloud computing, pervasive computing, and Internet of Things are eminent examples. For these systems,...

Understanding Wind Power Technology: Theory, Deployment and Optimisation
Understanding Wind Power Technology: Theory, Deployment and Optimisation

Wind energy technology has progressed enormously over the last decade. In coming years it will continue to develop in terms of power ratings, performance and installed capacity of large wind turbines worldwide, with exciting developments in offshore installations.

Designed to meet the training needs of wind engineers, this...

Computational Social Network Analysis: Trends, Tools and Research Advances (Computer Communications and Networks)
Computational Social Network Analysis: Trends, Tools and Research Advances (Computer Communications and Networks)

Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities.

This unique text/reference compares...

Advanced Programming in the UNIX® Environment: Second Edition
Advanced Programming in the UNIX® Environment: Second Edition
"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations...
.NET Security and Cryptography
.NET Security and Cryptography

Security and cryptography, while always an essential part of the computing industry, have seen their importance increase greatly in the last several years. Microsoft's .NET Framework provides developers with a powerful new set of tools to make their applications secure. .NET Security and...

Apple Pro Training Series : Advanced Editing Techniques in Final Cut Pro 5
Apple Pro Training Series : Advanced Editing Techniques in Final Cut Pro 5
In the only Apple-certified guide to advanced video editing techniques, award-winning filmmaker Michael Wohl delivers comprehensive training in the real-world skills that professionals use every day. Working through six hours of superb raw footage on two DVD-9 discs, you'll learn to cut dialogue, action, comedy, chases, fights, interviews,...
New Era Value Investing: A Disciplined Approach to Buying Value and Growth Stocks
New Era Value Investing: A Disciplined Approach to Buying Value and Growth Stocks
A unique guide that combines the best of traditional value theory with an innovative approach to assessing value in low or non-dividend paying stocks

In the 1990s, America's focus on productivity and innovation led to huge gains in technology, communication, and healthcare stocks, and contributed to the transformation of the...

Timing
Timing
With the advent of nanometer technologies, circuit performance constraints are becoming ever more stringent. In this context, automated timing analysis and optimization becomes imperative for the design of high-performance circuits that must satisfy a demanding set of constraints. Timing overviews the state of the art in timing...
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
Monitoring, Security, and Rescue Techniques in Multiagent Systems (Advances in Soft Computing)
In todays society the issue of security, understood in the widest context, have become a crucial one. The people of the information age, having instant access to the sources of knowledge and information expect the technology to improve their safety in all respects. That, straightforwardly, leads to the demand for methods, technologies, frameworks...
Pro Spring Security
Pro Spring Security

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security will be a reference and advanced tutorial
...

unlimited object storage image
Result Page: 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy