Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

TeamCity 7 Continous Integration
TeamCity 7 Continous Integration

Nowadays, Agile application development is usually done at a fast pace when many developers are working on the same piece of code. Every so often, this becomes a real challenge if there's no permanent control over consistency of the project source. It is often impossible to force lazy and/or busy programmers to execute tests before and...

Magic Is Dead: My Journey into the World's Most Secretive Society of Magicians
Magic Is Dead: My Journey into the World's Most Secretive Society of Magicians

In the vein of Neil Strauss’ The Game and Joshua Foer’s Moonwalking with Einstein comes the fascinating story of one man’s colorful, mysterious, and personal journey into the world of magic, and his unlikely invitation into an underground secret society of revolutionary magicians from...

Ninja Innovation: The Ten Killer Strategies of the World's Most Successful Businesses
Ninja Innovation: The Ten Killer Strategies of the World's Most Successful Businesses

Innovate or die

For thirty years, Gary Shapiro has observed the world's most innovative businesses from his front-row seat as leader of the Consumer Electronics Association. Now he reveals the ten secrets of "ninja innovators" like Apple, Amazon, Google, Microsoft, and many others.

What does it take to...

Best Practices Are Stupid: 40 Ways to Out-Innovate the Competition
Best Practices Are Stupid: 40 Ways to Out-Innovate the Competition

What if almost everything you know about creating a culture of innovation is wrong? What if the way you are measuring innovation is choking it? What if your market research is asking all of the wrong questions?

It's time to innovate the way you innovate.

Stephen Shapiro is one of America's foremost innovation...

Cities in a Globalizing World: Governance, Performance, And Sustainability (Wbi Learning Resources Series)
Cities in a Globalizing World: Governance, Performance, And Sustainability (Wbi Learning Resources Series)
World Bank research shows that in 2003, 48 percent of the world’s population (3 billion people) lived in urban areas—a 33 percent increase from the 1990 level. By 2020, 4.1 billion people (55 percent of the world’s population) will live in urban areas. Almost 94 percent of the increase will occur in developing countries. By 2015,...
The Casimir Effect
The Casimir Effect
"... the book is very comprehensive, clearly written and filled with wonderful physics." -- CERN Courier, Mar 2002

"Milton's attractively slim book will guide the serious beginner and its analytical rigor should also attract experienced theorists" -- Physics Today, Jan 2003
...
Web Standards Creativity: Innovations in Web Design with XHTML, CSS, and DOM Scripting
Web Standards Creativity: Innovations in Web Design with XHTML, CSS, and DOM Scripting
Here at friends of ED, we know that as a web designer or developer, your work involves more than just working to pay the bills. We know that each day, you strive to push the boundaries of your medium, unleashing your creativity in new ways to make your websites more engaging and attractive to behold, while still maintaining cross-browser support,...
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
The Edge of Infinity: Supermassive Black Holes in the Universe
The Edge of Infinity: Supermassive Black Holes in the Universe

This timely book is suitable for the general reader wishing to find answers to some of the intriguing questions now being asked about black holes. Although once recognized as the most destructive force in nature, following a cascade of astonishing discoveries, the opinion of supermassive black holes has undergone a dramatic shift. Astronomers...

Whiteboard Selling: Empowering Sales Through Visuals
Whiteboard Selling: Empowering Sales Through Visuals

Create compelling whiteboard presentations to engage your customers and win their business

Whiteboard Selling offers a step-by-step approach to transforming your message and selling style by using powerful visual stories that inspire and engage customers and prospects. Free your sales force from relying on slides and...

Preventing Web Attacks with Apache
Preventing Web Attacks with Apache

The only end-to-end guide to securing Apache Web servers and Web applications

Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....

unlimited object storage image
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy