Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Engineering Secure Software and Systems: Third International Symposium
Engineering Secure Software and Systems: Third International Symposium

It is our pleasure to welcome you to the third edition of the International Symposium on Engineering Secure Software and Systems.

This unique event aims at bringing together researchers from software engineering and security engineering, which might help to unite and further develop the two communities in this and future...

Rules of Play: Game Design Fundamentals
Rules of Play: Game Design Fundamentals
For hundreds of years, the field of game design has drifted along under the radar of culture, producing timeless masterpieces and masterful time-wasters without drawing much attention to itself-without, in fact, behaving like a "field" at all. Suddenly, powered by the big bang of computer technology, game design has...
Sams Teach Yourself Microsoft Dynamics CRM 2011 in 24 Hours
Sams Teach Yourself Microsoft Dynamics CRM 2011 in 24 Hours

In just 24 sessions of one hour or less, you’ll learn how to drive powerful business results with Microsoft Dynamics CRM 2011! Using this book’s straightforward, step-by-step approach, you’ll learn how to orchestrate successful CRM projects, automate processes, create more efficient workflows, optimize...

Ethics and Intersex (International Library of Ethics, Law, and the New Medicine)
Ethics and Intersex (International Library of Ethics, Law, and the New Medicine)

This collection of 21 articles is designed to serve as a state-of-the art reference book for intersexuals, their parents, health care professionals, ethics committee members, and anyone interested in problems associated with intersexuality. It fills an important need because of its uniqueness as an interdisciplinary effort, bringing together...

Microsoft Dynamics CRM 2011 Cookbook
Microsoft Dynamics CRM 2011 Cookbook

Includes over 75 incredible recipes for deploying, configuring, and customizing your CRM application

Overview

  • Step-by-step guide to deploy Dynamics CRM 2011 components, configuring claim-based authentication and IFD deployment
  • Focus on Dynamics CRM 2011 server maintenance and optimization...
Computer Science: Reflections on the Field, Reflections from the Field
Computer Science: Reflections on the Field, Reflections from the Field

Computer Science: Reflections on the Field, Reflections from the Field provides a concise characterization of key ideas that lie at the core of computer science (CS) research. The book offers a description of CS research recognizing the richness and diversity of the field. It brings together two dozen essays on diverse aspects...

Foundations of Corneal Disease: Past, Present and Future
Foundations of Corneal Disease: Past, Present and Future

The field of cornea has seen tremendous advances over the last 40 years?this uniquely comprehensive book will discuss the history of these advances, current best practices in important diseases of the cornea and ocular surface, and examine future directions in diagnosis and management. Written by leading experts, many of whom trained...

Core JSP
Core JSP

In recent years, a large amount of software development activity has migrated from the client to the server. The client-centric model, in which a client executes complex programs to visualize and manipulate data, is no longer considered appropriate for the majority of enterprise applications. The principal reason is deployment—it is a...

Handbook of Preventive Interventions for Adults
Handbook of Preventive Interventions for Adults
A complete and current overview of preventive interventions and programs for adults

More than at any time in our history, people are living longer. Yet, in many cases, individuals are beset by emotional, physical, and social problems that can erode their quality of life. Whether the issue is obesity, anxiety, or partner violence, all of these...

Crimeware: Understanding New Attacks and Defenses (Symantec Press)
Crimeware: Understanding New Attacks and Defenses (Symantec Press)
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”
The Disappearing Computer: Interaction Design, System Infrastructures and Applications for Smart Environments
The Disappearing Computer: Interaction Design, System Infrastructures and Applications for Smart Environments
“The-computer-as-we-know-it” will have no role in our future everyday lives. This is the position taken in this book which elaborates how it will be replaced by a new generation of technologies, moving computing off the desktop and ultimately integrating it with real world objects and everyday environments. Computing becomes thus an...
The Principles of Semiconductor Laser Diodes and Amplifiers: Analysis and Transmission Line Laser Modeling
The Principles of Semiconductor Laser Diodes and Amplifiers: Analysis and Transmission Line Laser Modeling

Optical communications technology is growing increasingly in importance, with a rapid pace of development. Innovative optical devices have emerged from the integration of semiconductor laser diodes, amplifiers and filters with optical waveguide technology. This well-researched volume traces the evolution of semiconductor laser amplifiers...

unlimited object storage image
Result Page: 257 256 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy