Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Spring Security
Pro Spring Security

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security will be a reference and advanced tutorial
...

Guided Waves in Structures for SHM: The Time - domain Spectral Element Method
Guided Waves in Structures for SHM: The Time - domain Spectral Element Method

Understanding and analysing the complex phenomena related to elastic wave propagation has been the subject of intense research for many years and has enabled application in numerous fields of technology, including structural health monitoring (SHM). In the course of the rapid advancement of diagnostic methods utilising elastic wave...

A Synthesis of Time: Zakat, Islamic Micro-finance and the Question of the Future in 21st-Century Indonesia
A Synthesis of Time: Zakat, Islamic Micro-finance and the Question of the Future in 21st-Century Indonesia

This book is an anthropological investigation into the different forms the economy assumes, and the different purposes it serves, when conceived from the perspective of Islamic micro-finance as a field of everyday practice. It is based on long-term ethnographic research in Java, Indonesia, with Islamic foundations active in managing...

Cognition in A Digital World
Cognition in A Digital World
Massive changes are occurring in society regarding the delivery of information
to individuals and the way individuals process this information. These
changes happen at work, at home, and in schools; the Internet and the
World Wide Web (WWW) are changing people’s working lives, leisure
time, work settings, and educational
...
Guide to Wireless Network Security
Guide to Wireless Network Security

With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,...

Artificial Intelligence in Theory and Practice: IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile
Artificial Intelligence in Theory and Practice: IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
Apache Hive Essentials
Apache Hive Essentials

Immerse yourself on a fantastic journey to discover the attributes of big data by using Hive

About This Book

  • Discover how Hive can coexist and work with other tools in the Hadoop ecosystem to create big data solutions
  • Grasp the skills needed, learn the best practices, and avoid the...
Speech and Human-Machine Dialog (The International Series in Engineering and Computer Science)
Speech and Human-Machine Dialog (The International Series in Engineering and Computer Science)
The conjunction of several factors having occurred throughout the past
few years will make humans significantly change their behavior vis-à-vis machines.
In particular the use of speech technologies will become normal in
the professional domain, but also in everyday life. The performance of speech
recognition components
...
Software Studies: A Lexicon (Leonardo Books)
Software Studies: A Lexicon (Leonardo Books)
This collection of short expository, critical, and speculative texts offers a field guide to the cultural, political, social, and aesthetic impact of software. Computing and digital media are essential to the way we work and live, and much has been said about their influence. But the very material of software has often been left invisible. In...
The Excel Analyst's Guide to Access
The Excel Analyst's Guide to Access

The ultimate handbook for Excel analysts who need reporting solutions using Access

Excel and Access are intended to work together. This book offers a comprehensive review of the extensive analytical and reporting functionality that Access provides and how it enhances Excel reporting functions.

Sales managers, operations...

Learning Cypher
Learning Cypher

Write powerful and efficient queries for Neo4j with Cypher, its official query language

About This Book

  • Improve performance and robustness when you create, query, and maintain your graph database
  • Save time by writing powerful queries using pattern matching
  • Step-by-step...
Artificial Intelligence in Education (Frontiers in Artificial Intelligence and Applications)
Artificial Intelligence in Education (Frontiers in Artificial Intelligence and Applications)
The 12th International Conference on Artificial Intelligence in Education (AIED-2005) is being held July 18–22, 2005, in Amsterdam, the beautiful Dutch city near the sea. AIED-2005 is the latest in an on-going series of biennial conferences in AIED dating back to the mid-1980’s when the field emerged from a synthesis of artificial...
unlimited object storage image
Result Page: 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy