Home | Amazing | Today | Tags | Publishers | Years | Search 
Remote Sensing of Snow and Ice
Remote Sensing of Snow and Ice
Although our planet is characterized by water, the extent to which water in its frozen state plays a role in the functioning of the Earth is perhaps underappreciated. Snow and ice cover about a sixth of the Earth’s surface, as snow lying on the ground, as glaciers and larger masses of terrestrial ice, including the huge...
Signal Processing for Remote Sensing
Signal Processing for Remote Sensing
Signal processing has been playing an increasingly important role in remote sensing, though most remote sensing literatures are concerned with remote sensing images. Many data received by remote sensors such as microwave and geophysical sensors, are signals or waveforms, which can be processed by analog and digital signal...
Getting Started with Oracle Data Integrator 11g: A Hands-on Tutorial
Getting Started with Oracle Data Integrator 11g: A Hands-on Tutorial

The May 26, 2011 edition of the Economist magazine cites a report by the the McKinsey Global Institute (MGI) about data becoming a factor of production, such as physical or human capital. Across the industry, enterprises are investing significant resources in harnessing value from vast amounts of data to innovate, compete, and reduce...

Interfaces on Trial 2.0 (The Information Society Series)
Interfaces on Trial 2.0 (The Information Society Series)

We live in an interoperable world. Computer hardware and software products from different manufacturers can exchange data within local networks and around the world using the Internet. The competition enabled by this compatibility between devices has led to fast-paced innovation and prices low enough to allow ordinary users to command...

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Requirements Engineering: Foundation for Software Quality: 18th International Working Conference
Requirements Engineering: Foundation for Software Quality: 18th International Working Conference

This LNCS volume contains the papers accepted for presentation at the 18th Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2012), held in Essen, Germany, during March 19–22, 2012.

Requirements engineering (RE) has long been recognized as a major factor for achieving high-quality...

iPhone User Interface Cookbook
iPhone User Interface Cookbook

The incredible growth rates for the iPhone, iPod touch, and iPad have pushed consumers to a new "App" economy, with developers racing to the platform. Mobile touch-centric interfaces vary greatly from traditional computing platforms, and programmers as well as designers must learn to adapt to the new form-factor.

...

Inkscape 0.48 Illustrator's Cookbook
Inkscape 0.48 Illustrator's Cookbook

Inkscape is frequently mentioned, and lauded, as one of the best examples of open-source software available today. It is a mature, feature-full and flexible product, thanks to a very dedicated developer community. The latest version, 0.48, adds new tools, such as the Airbrush (which many have longed for), and advanced path editing,...

Configuring and Tuning Databases on the Solaris Platform
Configuring and Tuning Databases on the Solaris Platform

Modern corporations demand a high level of service from their IT environ- ments. Today's successful datacenter architectures consist of multiple tiers that use well-tuned and high-performance servers at every level.

Sun refers to this as the "end-to-end architecture." Typical tiers include powerful database...

Financial Cryptography and Data Security: 12th International Conference, FC 2008
Financial Cryptography and Data Security: 12th International Conference, FC 2008

I am are very happy to have taken part in the 12th Financial Cryptography and Data Security Conference (FC 2008). Due to the recent growth in the number of security and cryptography venues, the competition for high-quality submissions has been on the rise. Despite that, the continued success of FC is attested by the research...

CCNA Cisco Certified Network Associate Study Guide, includes CD-ROM: Exam 640-802
CCNA Cisco Certified Network Associate Study Guide, includes CD-ROM: Exam 640-802

Welcome to the exciting world of Cisco certification! You have picked up this book because you want something better—namely, a better job with more satisfaction. Rest assured that you have made a good decision. Cisco certification can help you get your first networking job or more money and a...

iPad Application Development For Dummies
iPad Application Development For Dummies

The world stood on its toes as Steve Jobs announced the iPad in January 2010 as “our most advanced technology in a magical and revolutionary device at an unbelievable price.”

Do you believe in magic? The iPad has that magical quality of disappearing into your hands as you explore content with it. You have to hold...

Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy