Home | Amazing | Today | Tags | Publishers | Years | Search 
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Algorithms and Computation: 11th International Conference, ISAAC 2000, Taipei, Taiwan
Algorithms and Computation: 11th International Conference, ISAAC 2000, Taipei, Taiwan
The papers in this volume were selected for presentation at the Eleventh Annual International Symposium on Algorithms and Computation (ISAAC 2000), held on 18{20 December, 2000 at the Institute of Information Science, Academia Sinica, Taipei, Taiwan. Previous meetings were held in Tokyo (1990), Taipei (1991), Nagoya (1992),...
Professional Cross-Platform Mobile Development in C#
Professional Cross-Platform Mobile Development in C#

PEOPLE TAKE UP MOBILE DEVELOPMENT these days for a lot of reasons. For some it is all about learning something new, but for many it comes out of necessity of a job or career. Perhaps you see mobile development as the next big thing, just like client-server development was in the 1990s, or web development became in the 2000s. Maybe...

Microsoft SharePoint 2010 development cookbook
Microsoft SharePoint 2010 development cookbook
There is a heavy demand in the marketplace for SharePoint developers that you could take advantage of—if only you had the opportunity to acquire the relevant skills! However, SharePoint 2010 is a big, old, product with a steep learning curve—so where do you begin?

This book has been designed to take the
...
.NET 4.0 Generics Beginner's Guide
.NET 4.0 Generics Beginner's Guide
It is my pleasure to write the foreword to a book which will introduce you to the world of generic programming with C# and other .NET languages. You will be able to learn a lot from this book, as it introduces you to the elegant power of generic programming in C#. Through it, you will become a better C# programmer, and a better programmer in...
Apache Tomcat 7
Apache Tomcat 7
The first edition of this book covered the then-new Jakarta Tomcat 4. Tomcat has come a long way from there, becoming Apache Tomcat in the process, with version 7 released in January 2011. During this time, Tomcat has become the most popular and used Java servlet container on the market. Other open source application servers also...
Aspects of Natural Language Processing: Essays Dedicated to Leonard Bolc on the Occasion of His 75th Birthday
Aspects of Natural Language Processing: Essays Dedicated to Leonard Bolc on the Occasion of His 75th Birthday
This book is dedicated to Professor Leonard Bole on the occasion of his 75th birthday, and contains essays written by his friends, former students and col- leagues to celebrate his scientific career. For many years Leonard Bole has played an important role in the Polish computer science community. He was especially known for...
Combinatorial Image Analysis: 14th International Workshop, IWCIA 2011
Combinatorial Image Analysis: 14th International Workshop, IWCIA 2011
This volume includes the articles presented at the 14th International Workshop on Combinatorial Image Analysis, IWCIA 2011, held in Madrid, Spain, May 23–25, 2011. The 13 previous meetings were held in Paris (France) 1991, Ube (Japan) 1992, Washington D.C. (USA) 1994, Lyon (France) 1995, Hiroshima (Japan) 1997, Madras...
Transactions on Data Hiding and Multimedia Security VI
Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed introduction of these four papers, please refer to the Preface written by the organizers...
Arduino Internals
Arduino Internals

Let's investigate the inner-workings of your Arduino. It appears to be a simple machine, but it is not. Much effort has been invested to make it easy to learn and use. Unfortunately, these good intentions can mask some of the Arduino's underlying capabilities. You suspected that there was more, much more, under the simplistic...

Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010
Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010

These proceedings contain the papers presented at the 8th Internationl Symposium on Automated Technology for Verification and Analysis held during September 21–24, 2010 in Singapore. The primary objective of the ATVA conferences remains the same: to exchange and promote the latest advances of state-of-the-art research on...

Computer Networks: A Systems Approach, Fourth Edition (The Morgan Kaufmann Series in Networking)
Computer Networks: A Systems Approach, Fourth Edition (The Morgan Kaufmann Series in Networking)

Iwhat has happened in that time. We have seen the transformation of the Web from a small experiment to a World Wide phenomenon. We have seen the emergence of voice over IP and peer-to-peer content sharing. We have seen technology speed up a hundred-fold, the emergence of broadband to the home, and the rise of botnets and other horrid...

Result Page: 793 792 791 790 789 788 787 786 785 784 783 782 781 780 779 778 777 776 775 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy