Home | Amazing | Today | Tags | Publishers | Years | Search 
Java Software Solutions: Foundations of Program Design, Update JavaPlace
Java Software Solutions: Foundations of Program Design, Update JavaPlace
This book is about writing well-designed software. To understand software, we must first have a fundamental understanding of its role in a computer system. Hardware and software cooperate in a computer system to accomplish complex tasks. The nature of that cooperation and the purpose of various hardware components are important...
Data Structures and Algorithm Analysis in C (2nd Edition)
Data Structures and Algorithm Analysis in C (2nd Edition)

This book describes data structures, methods of organizing large amounts of data, and algorithm analysis, the estimation of the running time of algorithms. As computers become faster and faster, the need for programs that can handle large amounts of input becomes more acute. Paradoxically, this requires more careful attention...

Data Structures and Algorithm Analysis in Java (3rd Edition)
Data Structures and Algorithm Analysis in Java (3rd Edition)

This new Java edition describes data structures, methods of organizing large amounts of data, and algorithm analysis, the estimation of the running time of algorithms. As computers become faster and faster, the need for programs that can handle large amounts of input becomes more acute. Paradoxically, this requires more...

Cryptography and Network Security
Cryptography and Network Security
The Internet, as a worldwide communication network, has changed our daily life in many ways. A new paradigm of commerce allows individuals to shop online. The World Wide Web (WWW) allows people to share information. The E-mail technology conned people in far-flung corners of the world. 'ITiis inevitable evolution has also cre-...
Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
Complex Networks: Second International Workshop, CompleNet 2010, Rio de Janeiro, Brazil, October 13-15, 2010
The International Workshop on Complex Networks—CompleNet (www.complenet.org)—was initially proposed in 2008 with the first workshop taking place in 2009. The initiative was the result of efforts from researchers from the Bio-Complex Laboratory in the Department of Computer Sciences at Florida Institute of...
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
The PayPal Official Insider Guide to Growing Your Business: Make money the easy way (PayPal Press)
Whether you’re shopping for clothes from your computer or mobile phone, or selling artworks around the globe, you face a dizzying array of choices and decisions. How do I pay? How do I get paid? What if something goes wrong?

The answer? PayPal.

We are—and will continue to be—the
...
PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide (4th Edition)
PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide (4th Edition)
Today’s Web users expect exciting pages that are updated frequently and provide a customized experience. For them, Web sites are more like communities, to which they’ll return time and again. At the same time, Web-site administrators want sites that are easier to update and maintain, understanding...
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany

The "European Institute for System Security (E.I.S.S.)" was founded on February 29, 1988 by cabinet resolution of the state government Baden-Wurttemberg. It is headed by Professor Thomas Beth and is affiliated with the Institute for Algorithms and Cognitive Systems (IAKS) of the Faculty for Computer Science at the University of...

Codecharts: Roadmaps and blueprints for object-oriented programs
Codecharts: Roadmaps and blueprints for object-oriented programs
In this book we set out to investigate some of the most difficult problems that software engineering faces. Although a young discipline, it nonetheless faces the most difficult challenges, as software is the most complex artefact ever crafted by humankind. As such, many of the problems can be traced to inadequate abstraction....
Result Page: 770 769 768 767 766 765 764 763 762 761 760 759 758 757 756 755 754 753 752 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy