Home | Amazing | Today | Tags | Publishers | Years | Search 
Algorithmic Randomness and Complexity (Theory and Applications of Computability)
Algorithmic Randomness and Complexity (Theory and Applications of Computability)

Though we did not know it at the time, this book’s genesis began with the arrival of Cris Calude in New Zealand. Cris has always had an intense interest in algorithmic information theory. The event that led to much of the recent research presented here was the articulation by Cris of a seemingly innocuous question. This question...

The Art and Science of Java
The Art and Science of Java

In The Art and Science of Java, Stanford professor and well-known leader in Computer Science Education Eric Roberts emphasizes the reader-friendly exposition that led to the success of The Art and Science of C. By following the recommendations of the Association of Computing Machinery’s Java Task Force, this first edition...

Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)
Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)

Written by four experienced Nokia Telecommunications software developers, this practical book focuses on object-based and component-based software development. The authors concentrate on the most important issues in real-life software development, such as the development process itself, software architecture, the development of user...

Beginning iOS Apps with Facebook and Twitter APIs: for iPhone, iPad, and iPod touch
Beginning iOS Apps with Facebook and Twitter APIs: for iPhone, iPad, and iPod touch

Beginning iOS Apps with Facebook and Twitter APIs shows you how to add the power of social networking to your mobile apps on iPhone, iPad, and iPod touch. With this book as your guide, you can write apps that connect to Facebook and Twitter quickly, securely, and discreetly. Instead of starting from scratch, you will build on the...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

SharePoint 2010 Disaster Recovery Guide
SharePoint 2010 Disaster Recovery Guide

If you’ve done any previous research on SharePoint disaster recovery topics, such as content recovery, backup and restore, and high availability, you’ve probably found quite a bit of information on the subject. That held true for us when we wrote the original Disaster Recovery Guide for SharePoint 2007, and it’s just as true...

Pattern Recognition: 31st DAGM Symposium, Jena, Germany, September 9-11, 2009, Proceedings
Pattern Recognition: 31st DAGM Symposium, Jena, Germany, September 9-11, 2009, Proceedings

In 2009, for the second time in a row, Jena hosted an extraordinary event. In 2008, Jena celebrated the 450th birthday of the Friedrich Schiller University of Jena with the motto “Lichtgedanken” – “flashes of brilliance.” This year, for almost one week, Jena became the center for the pattern recognition research...

Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009
Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009

This volume collects the papers accepted for presentation at MIRAGE 2009. The MIRAGE conference is continuing to receive international recognition, with this year’s presentations coming from 25 countries despite the large worldwide financial crisis. This time Asia submitted far fewer papers than previously and fewer than Europe. France...

Adaptive Multimedia Retrieval: Retrieval, User, and Semantics: 5th International Workshop, AMR 2007
Adaptive Multimedia Retrieval: Retrieval, User, and Semantics: 5th International Workshop, AMR 2007

This book is a selection of the revised contributions that were initially submitted to the International Workshop on Adaptive Multimedia Retrieval (AMR 2007). The workshop was organized at the University Pierre and Marie Curie in Paris, France, during July 5–6, 2007.

The goal of the AMR workshops is to intensify the exchange...

Approximation and Online Algorithms: 7th International Workshop, WAOA 2009, Copenhagen
Approximation and Online Algorithms: 7th International Workshop, WAOA 2009, Copenhagen

The 7th Workshop on Approximation and Online Algorithms (WAOA 2009) focused on the design and analysis of algorithms for online and computationally hard problems. Both kinds of problems have a large number of applications from a variety of fields. WAOA 2009 took place in Copenhagen, Denmark, during September 10–11, 2009. The workshop...

Out of the Inner Circle: A Hacker's Guide to Computer Security
Out of the Inner Circle: A Hacker's Guide to Computer Security

This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system....

Cyber Risks for Business Professionals: A Management Guide
Cyber Risks for Business Professionals: A Management Guide

The benefits which Internet technologies offer to business professionals also present considerable risks. The management of these risks is the focus of this book.

Realize the benefits of Internet technologies, while ensuring your company is protected from the associated risks!

An effective risk management...

Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy