Home | Amazing | Today | Tags | Publishers | Years | Search 
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...

Destroying the Village
Destroying the Village

Up until the mid-1950s President Dwight D. Eisenhower believed that waging all-out war against an enemy threatening to end your national existence was right, natural, and necessary. In the wake of World War Two this was hardly a controversial position, as memories of Munich, Pearl Harbor, and Adolf Hitler had made the notion of just...

Concepts of Chemical Engineering 4 Chemists (RSC '4' Chemists)
Concepts of Chemical Engineering 4 Chemists (RSC '4' Chemists)

This book is meant as a handbook and resource guide for chemists (and other scientists) who either find themselves working alongside chemical engineers or who are undertaking chemical engineering-type projects and who wish to communicate with their colleagues and understand chemical engineering principles. The book has arisen out of...

Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)
Database Systems: A Practical Approach to Design, Implementation, and Management (International Computer Science Series)

The history of database research over the past 30 years is one of exceptional productivity that has led to the database system becoming arguably the most impor tant development in the field of software engineering- The database is now the underlying framework of the information system, and has fundamentally changed the way many...

The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection

This book is generally about software intellectual property and specifically about the field of software forensics. While you may never testify in a courtroom, attempt to deduce the true owner of a valuable program, or measure the intellectual property (IP) value of software source code, if you are at all involved with software you...

Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Principles of Communications Networks and Systems
Principles of Communications Networks and Systems

This book addresses the fundamentals of communications systems and networks, providing models and analytical methods for evaluating their performance. It is divided into ten chapters, which are the result of a joint effort by the authors and contributors. The authors and the contributors have a long history of collaboration, both in...

MasterCases in Hand and Wrist Surgery
MasterCases in Hand and Wrist Surgery

Textbook surgical education usually follows a predictable format involving fairly in-depth descriptions of various pathologic conditions including etiology, pathophysiology, symptomatology, diagnostic procedures, conservative management, and surgical treatment. Although there is variation in the emphasis different books place on each...

Advanced Artificial Intelligence (Series on Intelligence Science)
Advanced Artificial Intelligence (Series on Intelligence Science)

Artificial Intelligence's long-term goal is to build the human level of artificial intelligence. AI was born 50 years ago, in the bumpy road has made encouraging progress, in particular, machine learning, data mining, computer vision, expert systems, natural language processing, planning, robotics and related applications have...

Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne
Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne

CHES 2009, the 11th workshop on Cryptographic Hardware and Embedded Systems, was held in Lausanne, Switzerland, September 6–9, 2009. The workshop was sponsored by the International Association for Cryptologic Research (IACR).

The workshop attracted a record number of 148 submissions from 29 countries, of which the...

Pro iOS Web Design and Development: HTML5, CSS3, and JavaScript with Safari
Pro iOS Web Design and Development: HTML5, CSS3, and JavaScript with Safari

These are exciting times for those who live and work with technology every day, whether they are young people who have been using technology since birth, or, like many others, have had to adapt to it.

It is an exciting moment because in recent years there is no other example of technology that has changed our lives so
...

iOS 5 Programming Pushing the Limits: Developing Extraordinary Mobile Apps for Apple iPhone, iPad, and iPod Touch
iOS 5 Programming Pushing the Limits: Developing Extraordinary Mobile Apps for Apple iPhone, iPad, and iPod Touch
Apple has a history of alternating its releases between user-focus and developer-focus. The good news about iOS 5 is that it's all about the developers. The addition of Automatic Reference Counting (ARC) alone is worth the upgrade for developers. In one move, Apple has eliminated the number one cause of crashes in iOS applications,...
Result Page: 179 178 177 176 175 174 173 172 171 170 169 168 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy