Home | Amazing | Today | Tags | Publishers | Years | Search 
The Book of Weeds: How to Deal with Plants that Behave Badly
The Book of Weeds: How to Deal with Plants that Behave Badly

Finally, from the author of Compost, fascinating information and advice on handling weeds - how to recognize them, how to control them, and how to exploit them. The first step is to know your enemy, so weeds are identified and the survival strategies of various types is explained to enable you to get rid of them more easily. Finally,...

BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

Data Management and Query Processing in Semantic Web Databases
Data Management and Query Processing in Semantic Web Databases

The Semantic Web, which is intended to establish a machine-understandable Web, is currently changing from being an emerging trend to a technology used in complex real-world applications. A number of standards and techniques have been developed by the World Wide Web Consortium (W3C), e.g., the Resource Description Framework (RDF), which...

Alice 3 Cookbook
Alice 3 Cookbook

Alice is a free and innovative 3D programming environment that makes it easy to create an animation for telling a story, playing an interactive game, or a video to share on the Web. Alice is a teaching tool designed as a revolutionary approach to teaching and learning introductory programming concepts.

Alice 3 Cookbook focuses on...

Experience and Knowledge Management in Software Engineering
Experience and Knowledge Management in Software Engineering

Nowadays, there is software everywhere in our life. It controls cars, airplanes, factories, medical implants. Without software, banking, logistics and transportation, media, and even scientific research would not function in the accustomed way. Building and maintaining software is a knowledge-intensive endeavour and requires that specific...

The Compiler Design Handbook: Optimizations & Machine Code Generation
The Compiler Design Handbook: Optimizations & Machine Code Generation

In the last few years, changes have had a profound influence on the problems addressed by compiler designers. First, the proliferation in machine architectures has necessitated the fine-tuning of compiler back ends to exploit features such as multiple memory banks, pipelines and clustered architectures. These features provide potential for...

Cryptanalysis of RSA and Its Variants
Cryptanalysis of RSA and Its Variants

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its...

Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

Unity 3 Game Development Hotshot
Unity 3 Game Development Hotshot

Only Unity fits the bill of being a game engine that allows you to create a full 3D game for free, and with phenomenal community support. This book will equip you with the skills to create professional looking games at no cost.

Unity 3 Game Development Hotshot will teach you how to exploit the full array of Unity 3D's...

Programming in the 1990's: An Introduction to the Calculation of Programmes (Texts and Monographs in Computer Science)
Programming in the 1990's: An Introduction to the Calculation of Programmes (Texts and Monographs in Computer Science)

Programming is a fascinating and challenging subject. Unfortunately, it is rarely presented as such. Most often it is taught by "induction": features of some famous programming languages are given operational meaning (e.g. a loop "goes round and round"), a number of examples are shown, and by induction, we are asked to...

Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems
Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems

The 16th International Conference on Applications of Natural Language to Information Systems (NLDB 2011) was held during June 28–30, 2011, at the University of Alicante, Spain. Since the first NLDB conference in 1995, the main goal has been to provide a forum for the discussion and dissemination of research on the integration of...

Access Solutions: Tips, Tricks, and Secrets from Microsoft Access MVPs
Access Solutions: Tips, Tricks, and Secrets from Microsoft Access MVPs

Doug and I have known each other online for many years. We both became Microsoft MVPs about 10 years ago, and have been friends ever since. Both of us had been writing for magazines for years. Although we’d been talking about writing a book together for about five years now, there had always been an impediment, usually work, and...

Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy