Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

Taking Your iPad to the Max (Technology in Action)
Taking Your iPad to the Max (Technology in Action)

It looks different. It acts different. There’s no right way to hold it. It responds to the touch of your fingertips. It’s the Internet in your lap. It connects to the world, yet it is as personal as a well-worn book.

Taking Your iPad to the Max is written so that anyone, from a computer- savvy teenager to
...

Digital Signatures (Advances in Information Security)
Digital Signatures (Advances in Information Security)

As a beginning graduate student, I recall being frustrated by a general lack of accessible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren’t there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my...

The Design and Analysis of Parallel Algorithms
The Design and Analysis of Parallel Algorithms

This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem...

Handbook of Natural Language Processing, Second Edition
Handbook of Natural Language Processing, Second Edition

As the title of this book suggests, it is an update of the first edition of the Handbook of Natural Language Processing which was edited by Robert Dale, Hermann Moisl, and Harold Somers and published in the year 2000. The vigorous growth of new methods in Natural Language Processing (henceforth, NLP) since then, strongly suggested that...

Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation
Studies in Complexity and Cryptography: Miscellanea on the Interplay between Randomness and Computation

This volume contains a collection of studies in the areas of complexity theory and foundations of cryptography. These studies were conducted at different times during the last couple of decades. Although many of these studies have been referred to by other works, none of them was formally published before.

Indeed, this volume...

Java How to Program (early objects) (9th Edition) (Deitel)
Java How to Program (early objects) (9th Edition) (Deitel)

Welcome to Java and Java How to Program, Ninth Edition! This book presents leadingedge computing technologies for students, instructors and software developers.

The new Chapter 1 engages students with intriguing facts and figures to get them excited about studying computers and programming. The chapter includes a table of some of...

Advances in Grid and Pervasive Computing: 6th International Conference
Advances in Grid and Pervasive Computing: 6th International Conference

the emerging areas of grid computing, cloud computing, and pervasive computing. The 6th International Conference on Grid and Pervasive Computing, GPC 2011, was held in Oulu, Finland, during May 11-13, 2011. This volume contains the full papers that were presented at the conference. This program was preceded by one day of workshops, a...

Microsoft Windows Intune 2.0: Quickstart Administration
Microsoft Windows Intune 2.0: Quickstart Administration

Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7-so your computers and users can operate at peak performance all the time.

This step-by-step guide will show you how to plan, set up and maintain Windows Intune,...

Killer UX Design
Killer UX Design
When I embarked on my career as a psychologist, I never imagined I’d end up designing technology products and services. Funny where you end up in life, and lucky for me all those years at university weren’t wasted: the business of understanding humans and the way they behave is critical to designing....
Rhodes Framework for Android(TM) Platform and BlackBerry® Smartphones (SpringerBriefs in Computer Science)
Rhodes Framework for Android(TM) Platform and BlackBerry® Smartphones (SpringerBriefs in Computer Science)

The Rhodes framework offers several advantages over other mobile frameworks. Some of the unique features of the Rhodes frameworks are as follows:

- The only smartphone framework to offer support for the Model View Controller pattern

- The only smartphone framework to offer support for the Object-Relational manager

...
Practical Guide to Project Planning (ESI International Project Management Series)
Practical Guide to Project Planning (ESI International Project Management Series)

Practical Guide to Project Planning is filled with project documents and templates ready to use for planning and managing project. It explains project analysis and modeling techniques so these documents and templates can be used for effective project management. In addition, the book is also a guide to best practices that comply with...

unlimited object storage image
Result Page: 743 742 741 740 739 738 737 736 735 734 733 732 731 730 729 728 727 726 725 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy