 |
|
 |  |  Pattern Recognition: 31st DAGM Symposium, Jena, Germany, September 9-11, 2009, Proceedings
In 2009, for the second time in a row, Jena hosted an extraordinary event. In 2008, Jena celebrated the 450th birthday of the Friedrich Schiller University of Jena with the motto “Lichtgedanken” – “flashes of brilliance.” This year, for almost one week, Jena became the center for the pattern recognition research... |  |  |
|
|
 Cyber Risks for Business Professionals: A Management Guide
The benefits which Internet technologies offer to business professionals also present considerable risks. The management of these risks is the focus of this book.
Realize the benefits of Internet technologies, while ensuring your company is protected from the associated risks!
An effective risk management... |  |  Inside Microsoft SharePoint 2010
The purpose of this book is to help you design and develop custom business solutions for
SharePoint 2010, which includes the two products SharePoint Foundation and SharePoint
Server 2010. Our goal is to teach you how to create, debug, and deploy the fundamental
building blocks such as Features, Pages, Web Parts, Site Columns, Content... |  |  Encyclopedia of Cryptology
Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that... |
|
 The iMovie '11 Project Book
I love that I’ve been able to write a book about projects in iMovie.
Editing video, after all, is a project in many ways. It often requires a
good deal of time and attention to detail. It’s something you elect to
do, probably in your spare time, because you want to document
what happened at an event, or preserve memories,... |  |  Microsoft SQL Server 2008 High Availability
Every new version of SQL Server brings with it new tools and features for database administrators (DBAs), developers, and architects, for them to be able to provide an effective solution for the end users in a simpler and more efficient manner. The terms effective and efficiency can be measured in a technical perspective as High Availability... |  |  Tuscany SCA in Action
What brought the five of us together to write a book on Apache Tuscany and Service
Component Architecture (SCA)? We all had practical experience of how difficult and
costly integration of applications and technologies can be, and we were excited about
how Tuscany and SCA can help solve these problems. Having been involved... |
|
| Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 |