 |
|
 Elements of Computer Security (Undergraduate Topics in Computer Science)
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.
... |  |  Autodesk Revit Architecture 2011: No Experience Required
Learn Revit Architecture step by step with this project-based tutorial
Revit Architecture is the leading Building Information Modeling (BIM) software for architects and others in related fields. Written by renowned Revit trainer Eric Wing, this simple, yet engaging tutorial teaches you the program's basics.
... |  |  The Structure of Style: Algorithmic Approaches to Understanding Manner and Meaning
Style is a fundamental and ubiquitous aspect of the human experience: Everyone instantly and constantly assesses people and things according to their individual styles, academics establish careers by researching musical, artistic, or architectural styles, and entire industries maintain themselves by continuously creating and marketing new... |
|
|
|
 Secure Java: For Web Application Development
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure... |  |  Introduction To Digital Signal Processing: Computer Musically Speaking
This book offers an introduction to digital signal processing (DSP) with an emphasis on audio signals and computer music. It covers the mathematical foundations of DSP, important DSP theories including sampling, LTI systems, the z-transform, FIR/IIR filters, classic sound synthesis algorithms, various digital effects, topics in time and... |  |  Information Security and Cryptology: 5th International Conference, Inscrypt 2009
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are... |
|
| Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 |