Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Access Control Systems: Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models
Secure identification of users, programming agents, hosts, and networking devices is considered the core element of computing security. Rarely is anonymity a desired goal of systems, networks, and applications. This aspect is dictated largely by the extent in which computing has evolved to automate many facets of critical human activities, such as...
Concise Guide to Computation Theory
Concise Guide to Computation Theory

What is the theory of computation all about? The theory of computation embodies the principle by which computers have become the basis of modern digital technology, which makes a computer perform as desired, and which, consequently, has led to the prosperity of our advanced information society (just as physical sciences constitute the...

Maximizing Your Sales with Salesforce.com
Maximizing Your Sales with Salesforce.com
With more than 1,000,000 active users, Salesforce.com is the most widely used online CRM application worldwide. Targeted to busy sales professionals, Salesforce.com can be used to manage sales, accounts, contacts, correspondence, activities, and more. If you’re one of these busy sales professionals, you need an easy reference tool to maximize...
Adobe Acrobat 7 in a Snap (Sams Teach Yourself)
Adobe Acrobat 7 in a Snap (Sams Teach Yourself)
Adobe PDF is the emerging workflow standard in the publishing, financial services, regulated and government industries, but learning all that Adobe Acrobat is capable of can take more time than most employees in these industries can spare. That's where Adobe Acrobat in a Snap comes in. The author will walk you...
Exploratory Multivariate Analysis by Example Using R (Chapman & Hall/CRC Computer Science & Data Analysis)
Exploratory Multivariate Analysis by Example Using R (Chapman & Hall/CRC Computer Science & Data Analysis)

Full of real-world case studies and practical advice, Exploratory Multivariate Analysis by Example Using R focuses on four fundamental methods of multivariate exploratory data analysis that are most suitable for applications. It covers principal component analysis (PCA) when variables are quantitative, correspondence analysis...

Windows Home Server: Protect and Simplify your Digital Life
Windows Home Server: Protect and Simplify your Digital Life
Secure and share your digital f iles at home.

Access them from virtually anywhere.

Photos. Tax records. Personal correspondence. Music and movies. Your home network contains much of what's vital to your life in today's digital world. You need to secure and back up those files. You need to be...

OpenOffice.org for Dummies
OpenOffice.org for Dummies
Start using this free and easy productivity suite today

Draft and print documents, design cool presentations, create detailed spreadsheets, and more

Ready to leave your other Office? Open this friendly guide and find out how OpenOffice.org opens up your options! You can collect your thoughts in Writer documents, crunch numbers with...

Quantum Mechanics
Quantum Mechanics
The principles of quantum mechanics were formulated by many people during a short period of time at the beginning of the twentieth century. Max Planck wrote down his formula for the spectrum of blackbody radiation and introduced the constant that now bears his name in 1900. By 1924, through the work of Einstein, Rutherford and Bohr, Schrodinger and...
Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping
Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping
This book opens up three new topics in modern Chinese literary history: the intimate lives of Lu Xun and Xu Guangping as a couple; real and imagined love-letters in modern Chinese literature; and concepts of privacy in China. The scandalous affair between modern China's greatest writer and his former student is revealed in their letters to each...
Decision Theory: Principles and Approaches (Wiley Series in Probability and Statistics)
Decision Theory: Principles and Approaches (Wiley Series in Probability and Statistics)
Decision theory provides a formal framework for making logical choices in the face of uncertainty. Given a set of alternatives, a set of consequences, and a correspondence between those sets, decision theory offers conceptually simple procedures for choice. This book presents an overview of the fundamental concepts and outcomes of rational decision...
Fiber Optic Data Communication: Technology Advances and Futures
Fiber Optic Data Communication: Technology Advances and Futures
In correspondence with the widely popular and original Handbook of Fiber Optic Data Communication First Edition, and now updated Second Edition (2001), experts in both industry and academia have compiled an excellent addition to the field of Fiber Optics. This work revisits and expounds on the future technology section of the first Handbook, while...
And Every Word Is True: Newfound evidence reveals Truman Capote's
And Every Word Is True: Newfound evidence reveals Truman Capote's
Truman Capote’s bestselling book “In Cold Blood” has captivated worldwide audiences for over fifty years. It is a gripping story about the consequences of a trivial robbery gone terribly wrong in a remote village of western Kansas.But what if robbery was not the motive at all, but something more sinister? And why would the...
unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy