Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Camera Networks: The Acquisition and Analysis of Videos over Wide Areas (Synthesis Lectures on Computer Vision)
Camera Networks: The Acquisition and Analysis of Videos over Wide Areas (Synthesis Lectures on Computer Vision)
Camera networks is a highly interdisciplinary area of research that has been very active over the last few years. In this book, we focus specifically on the topic of video understanding in camera networks and touch upon the other related areas (e.g., communication resources, machine learning, cooperative control of multi-agent...
First Course on Fuzzy Theory and Applications (Advances in Soft Computing)
First Course on Fuzzy Theory and Applications (Advances in Soft Computing)

This basic textbook gives an easily accessible introduction to fuzzy theory and its applications. It provides basic and concrete concepts of the field in a self-contained, condensed and understandable style. This First Course on Fuzzy Theory and Applications includes numerous examples, descriptive illustrations and figures of the basic concepts,...

An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required...
Grant Writing DeMYSTiFied
Grant Writing DeMYSTiFied

Create the perfect proposal to win funding for your ideas and plans

Need money for your charity or project but do not know the first thing about writing a grant? Let this DeMYSTiFied book unravel the secrets of this process. It will take you step-by-step through the fundamentals--from writing a letter of inquiry to outlining...

The NURBS Book (Monographs in Visual Communication)
The NURBS Book (Monographs in Visual Communication)

The second, revised edition of this book covers all aspects of non-uniform rational B-splines necessary to design geometry in a computer-aided environment. Basic B-spline features, curve and surface algorithms, and state-of-the-art geometry tools are all discussed. Detailed code for design algorithms and computational tricks are covered, too,...

The Trouble with Higher Education: A Critical Examination of our Universities
The Trouble with Higher Education: A Critical Examination of our Universities

The Trouble with Higher Education is a powerful and topical critique of the Higher Education system in the UK, with relevance to countries with similar systems.  Based on the authors’ experiences that span over 30+ years of fieldwork, the issues discussed focus on the problems facing the principle responsibilities of...

JavaScript(TM) Phrasebook
JavaScript(TM) Phrasebook
Developers are hungry for a concise, easy-to-use reference that puts essential code "phrases" at their fingertips. JavaScript, and the related AJAX, is hot and there is little to no information on how to use JavaScript to develop AJAX-based applications. While there are many JavaScript books on the market, most of them are dated and few...
EndNote 1 - 2 - 3  Easy!: Reference Management for the Professional
EndNote 1 - 2 - 3 Easy!: Reference Management for the Professional
Reference management is the process of storing, managing, retrieving, and citing references from various sources. Learning effective reference management is critically important for healthcare and biomedical professionals as it is a major component of the process of scientific manuscript writing. Effective reference management is also useful for...
TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers (The Morgan Kaufmann Practical Guides Series)
TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers (The Morgan Kaufmann Practical Guides Series)
This succinct new edition of our best-selling title presents everything you need know to get up and running with C sockets programming in one affordable volume!

The Internet allows computers thousands of miles apart to exchange information through programs such as Web browsers, and nearly all of these programs gain access to
...
Music Composition For Dummies
Music Composition For Dummies

Creative exercises build your composing skills

The fun and easy way to turn the tune in your head into a full-fledged composition!

Wish you could write music? You can! This friendly guide gives you everything you need to start composing, from choosing the right rhythm and tempo to...

Result Page: 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy