Home | Amazing | Today | Tags | Publishers | Years | Search 
California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)
California and the Fictions of Capital (Commonwealth Center Studies in the History of American Culture)

Between the frequently recounted events of the Gold Rush and the Great Depression stretches a period of California history that is equally crucial but less often acknowledged. In his fresh, synthetic consideration of these in-between years, George L. Henderson points specifically to the take-off of California's rural juggernaut between...

Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009
Computer Vision/Computer Graphics Collaboration Techniques: 4th International Conference, MIRAGE 2009

This volume collects the papers accepted for presentation at MIRAGE 2009. The MIRAGE conference is continuing to receive international recognition, with this year’s presentations coming from 25 countries despite the large worldwide financial crisis. This time Asia submitted far fewer papers than previously and fewer than Europe. France...

Actors in Scala
Actors in Scala

Recent trends in computer architecture make concurrency and parallelism an essential ingredient of efficient program execution. The actor model of concurrency allows you to express real-world concurrency in a natural way using concurrent processes that communicate via asynchronous messages. Scala is a programming language for the Java...

WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

Knowledge Representation and Reasoning Under Uncertainty: Logic at Work
Knowledge Representation and Reasoning Under Uncertainty: Logic at Work

This volume is based on the International Conference Logic at Work, held in Amsterdam, The Netherlands, in December 1992. The 14 papers in this volume are selected from 86 submissions and 8 invited contributions and are all devoted to knowledge representation and reasoning under uncertainty, which are core issues of formal artificial...

Unobstructed Shortest Paths in Polyhedral Environments (Lecture Notes in Computer Science)
Unobstructed Shortest Paths in Polyhedral Environments (Lecture Notes in Computer Science)

The study of minimum paths on or around polyhedra in Euclidean 3-space is of growing importance in robotics. This work presents new algorithms based on extensions of the Voronoi diagram. Since experience with new algo- rithms is also important, this work also describes a workbench to allow experimentation.

This book is...

Utility-Based Learning from Data
Utility-Based Learning from Data

Statistical learning — that is, learning from data — and, in particular, probabilistic model learning have become increasingly important in recent years. Advances in information technology have facilitated an explosion of available data. This explosion has been accompanied by theoretical advances, permitting new and...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Web Application Security, A Beginner's Guide
Web Application Security, A Beginner's Guide

Security Smarts for the Self-Guided IT Professional

“Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting...

The Handbook of Commodity Investing (Frank J. Fabozzi Series)
The Handbook of Commodity Investing (Frank J. Fabozzi Series)

Filled with a comprehensive collection of information from experts in the commodity investment industry, this detailed guide shows readers how to successfully incorporate commodities into their portfolios. Created with both the professional and individual investor in mind, The Handbook of Commodity Investments covers a wide range of...

How to Eat an Elephant: Achieving Financial Success One Bite at a Time
How to Eat an Elephant: Achieving Financial Success One Bite at a Time

Take control of your personal finances—one bite at a time

Getting your financial house in order is a big job. At first, you might even feel like you've bitten off more than you can chew. But don't give up! In How to Eat an Elephant, you'll gain vital understanding of important personal finance basics...

Nightwork: A History of Hacks and Pranks at MIT
Nightwork: A History of Hacks and Pranks at MIT

An MIT "hack" is an ingenious, benign, andanonymous prank or practical joke, often requiring engineering or scientificexpertise and often pulled off under cover of darkness -- instances of campus mischief sometimes coinciding withApril Fool's Day, final exams, or commencement. (It should not beconfused with the sometimes...

Result Page: 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy