Home | Amazing | Today | Tags | Publishers | Years | Search 
Visions of the Future: Chemistry and Life Science
Visions of the Future: Chemistry and Life Science
‘… you can’t deny the excitement the writers felt for what they are doing; and in these secular times such excitement must serve to replace the fear of the Lord as the beginning of wisdom.’?Sir Brian Pippard, Times Higher Education Supplement

‘I enjoyed these glimpses of what is going on and (always a good
...
Programming Erlang: Software for a Concurrent World
Programming Erlang: Software for a Concurrent World
Erlang solves one of the most pressing problems facing developers today: how to write reliable, concurrent, high-performance systems. It's used worldwide by companies who need to produce reliable, efficient, and scalable applications. Invest in learning Erlang now.

Moore's Law is the observation that the amount you can do on a single chip...

Auditor's Guide to Information Systems Auditing
Auditor's Guide to Information Systems Auditing

Praise for Auditor′s Guide to Information Systems Auditing

"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what...

Pro .NET 2.0 XML (Expert's Voice in .Net)
Pro .NET 2.0 XML (Expert's Voice in .Net)
XML is the de facto language for communication within and between distributed applications, whether they're on the Internet or a corporate network. XML is successful because of two strengths: it has a highly-structured human readable format and it can be transmitted as pure text. No matter how disparate applications and their architectures may be,...
XML Demystified
XML Demystified
The fast and easy way to learn XML

Start programming in XML right away using this easy-to-follow guide. XML Demystified explains how to build XML web applications that work on any platform or browser. Step-by-step instructions with lots of examples help you learn quickly.

This one-of-a-kind...

Knowledge-Based Intelligent Information and Engineering Systems
Knowledge-Based Intelligent Information and Engineering Systems
The three-volume set LNAI 3213, LNAI 3214, and LNAI 3215 constitutes the refereed proceedings of the 8th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2004, held in Wellington, New Zealand in September 2004.

The over 450 papers presented were carefully reviewed and selected from numerous...

Artificial Intelligence: Methodology, Systems, and Applications: 11th International Conference, AIMSA 2004, Varna, Bulgaria, September 2-4, 2004
Artificial Intelligence: Methodology, Systems, and Applications: 11th International Conference, AIMSA 2004, Varna, Bulgaria, September 2-4, 2004
The 11th Conference “Artificial Intelligence: Methodology, Systems, Applications – Semantic Web Challenges” (AIMSA 2004) continued successfully pursuing the main aim of the AIMSA series of conferences – to foster the multidisciplinary community of artificial intelligence researchers, embracing both the theoretic...
Scalable Infrastructure for Distributed Sensor Networks
Scalable Infrastructure for Distributed Sensor Networks
Wireless sensor networks is a rapidly developing area. New applications are emerging and breakthroughs are being made in solving the underlying scientific problems.

The effectiveness of sensor networks depends largely on deployment strategies, self-organization capabilities, routing and information dissemination protocols, all of which...

Hacking Exposed Web Applications, 2nd Ed.
Hacking Exposed Web Applications, 2nd Ed.

Implement bulletproof e-business security the proven Hacking Exposed way

Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Introducing Microsoft  ASP.NET AJAX (Pro - Developer)
Introducing Microsoft ASP.NET AJAX (Pro - Developer)

Get an expert introduction to the new JavaScript enhancements (code-named "Atlas") for Microsoft ASP.NET 2.0. More than a basic AJAX (Asynchronous JavaScript And XML) script library, the Microsoft implementation brings object orientation to JavaScript, together with enhanced client-side and server-side controls that greatly simplify...

Database System Concepts
Database System Concepts
Database management has evolved from a specialized computer application to a central component of a modern computing environment, and, as a result, knowledge about database systems has become an essential part of an education in computer science. In this text, we present the fundamental concepts of database management. These concepts include...
Result Page: 770 769 768 767 766 765 764 763 762 761 760 759 758 757 756 755 754 753 752 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy