Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Complete Vue.js 2 Web Development: Practical guide to building end-to-end web development solutions with Vue.js 2
Complete Vue.js 2 Web Development: Practical guide to building end-to-end web development solutions with Vue.js 2

Become a pro in creating modern interactive web applications using this JavaScript framework

Key Features

  • Explore the exciting features of Vue.js 2 through interesting examples and practical recipes
  • Craft highly modular applications using design patterns and the component...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
ReactJS by Example- Building Modern Web Applications with React
ReactJS by Example- Building Modern Web Applications with React

Key Features

  • Create pragmatic real-world applications while learning React and its modern developer tools
  • Build sustainable user interfaces by transforming data into components of UI
  • Learn how to generate reusable ReactJS components effectively

Book Description

...

Hibernate Recipes: A Problem-Solution Approach
Hibernate Recipes: A Problem-Solution Approach

Hibernate Recipes, Second Edition contains a collection of code recipes and templates for learning and building Hibernate solutions for you and your clients, including how to work with the Spring Framework and the JPA. This book is your pragmatic day-to-day reference and guide for doing all things involving Hibernate. There are many books...

Bitcoin for the Befuddled
Bitcoin for the Befuddled

Unless you've been living under a rock for the last couple of years, you've probably heard of Bitcoin—the game-changing digital currency used by millions worldwide.

But Bitcoin isn't just another way to buy stuff. It's an anonymous, revolutionary, cryptographically secure currency that functions...

HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

ValueWeb: How Fintech Firms are Using Bitcoin Blockchain and Mobile Technologies to Create the Internet  of Value
ValueWeb: How Fintech Firms are Using Bitcoin Blockchain and Mobile Technologies to Create the Internet of Value

The next generation internet, the Internet of Things, cannot work without an Internet of Value. The Internet of Value ― or ValueWeb, for short ― allows machines to trade with machines and people with people, anywhere on this planet in real-time and for free. The problem is that our old system cannot work that way, as it...

Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

Applied Statistics: Theory and Problem Solutions with R
Applied Statistics: Theory and Problem Solutions with R

Instructs readers on how to use methods of statistics and experimental design with R software 

Applied statistics covers both the theory and the application of modern statistical and mathematical modelling techniques to applied problems in industry, public services, commerce, and research. It proceeds...

Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

Professional Java, JDK 5 Edition
Professional Java, JDK 5 Edition
Java continues to be the dominant language for building server applications, and the latest update to the Java platform—JDK 5—boasts many new features, including a metadata facility, generics, autoboxing, and improved user interface performance. Building upon Ivor Horton's Beginning Java, this book provides insight into these...
unlimited object storage image
Result Page: 69 68 67 66 65 64 63 62 61 60 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy