Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive...
The Best of 2600: A Hacker Odyssey
The Best of 2600: A Hacker Odyssey
" … The Best of 2600: A Hacker Odyssey is an important, amazing book that tells the story of these kids and adults as they explore a new frontier."
—John Baichtal (Wired Blog, August, 2008)

"...a testament to a culture which thrived before computers and the internet mattered to most of...

From Gutenberg to Google: Electronic Representations of Literary Texts
From Gutenberg to Google: Electronic Representations of Literary Texts

Although this book focuses on the problems and potentials for electronic representations of the fundamental materials of document-based knowledge in literature, similar conditions obtain for representations of works in music, philosophy, history, the law, and religion. These fields find in paper documents the primary materials of...

Programming Embedded Systems in C and C ++
Programming Embedded Systems in C and C ++

This book introduces embedded systems to C and C++ programmers. Topics include testing memory devices, writing and erasing Flash memory, verifying nonvolatile memory contents, controlling on-chip peripherals, device driver design and implementation, optimizing embedded code for size and speed, and making the most of C++...

Encyclopedia of Virtual Communities and Technologies
Encyclopedia of Virtual Communities and Technologies
Advances in computer and telecommunications technologies during the past several decades, have facilitated the creation of virtual communities and organizations throughout the world. As the growth in virtual communities accelerates, researchers are facing new challenges to learn about the latest of research and practices in this fast growing filed....
Web Security, Privacy and Commerce, 2nd Edition
Web Security, Privacy and Commerce, 2nd Edition
The World Wide Web has changed our world. More than half the people in the United States now use the Web on a regular basis. We use it to read today's news, to check tomorrow's weather, and to search for events that have happened in the distant past. And increasingly, the Web is the focus of the 21st century...
Designing Embedded Processors: A Low Power Perspective
Designing Embedded Processors: A Low Power Perspective
As we embrace the world of personal, portable, and perplexingly complex digital systems, it has befallen upon the bewildered designer to take advantage of the available transistors to produce a system which is small, fast, cheap and correct, yet possesses increased functionality.

Increasingly, these systems have to consume little energy....

Database Programming Languages: 11th International Symposium, DBPL 2007, Vienna, Austria, September 23-24, 2007
Database Programming Languages: 11th International Symposium, DBPL 2007, Vienna, Austria, September 23-24, 2007
This volume contains the proceedings of the 11th International Symposium on Database Programming Languages (DBPL 2007), held in Vienna, Austria, on September 23–24, 2007. DBPL 2007 was one of 15 meetings co-located with VLDB (the International Conference on Very Large Data Bases).

DBPL continues to present the very best work at the
...
Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
Finite Element Methods for Engineers
Finite Element Methods for Engineers
The advent of high-speed electronic digital computers has given tremendous impetus to all numerical methods for solving engineering problems. Finite element methods form one of the most versatile classes of such methods, and were originally developed in the field of structural analysis. They are, however, equally applicable to continuum mechanics...
TYPO3 4.2 E-Commerce
TYPO3 4.2 E-Commerce

The popularity of online shopping has increased drastically over the past few years. TYPO3 is fully equipped to meet all the challenges of modern electronic commerce. TYPO3 can be enlarged from a pure content-based online catalog to a fully-grown shop system with a variety of extensions.

It may be easy to plan a website but when it...

Apple Training Series: iLife '11
Apple Training Series: iLife '11

The Apple Certified Way to Learn

In the only Apple certified guide to iLife, the authors have you working wonders with iLife ’11 within the first few pages. Featuring compelling footage and images, this book/DVD combo uses real-life material and practical lessons that you can apply immediately to enhance your own
...

unlimited object storage image
Result Page: 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy