Home | Amazing | Today | Tags | Publishers | Years | Search 
Advances in Grid and Pervasive Computing: Second International Conference, GPC 2007, Paris, France, May 2-4, 2007, Proceedings
Advances in Grid and Pervasive Computing: Second International Conference, GPC 2007, Paris, France, May 2-4, 2007, Proceedings
GPC 2007 provided a high-profile, leading-edge forum for researchers and developers from industry and academia to report on the latest scientific and technical advances, discuss and debate the major issues, and showcase the latest systems in merging grid computing and the pervasive computing field.

This year, a total of 217 high-quality
...
Conceptual Modelling in Information Systems Engineering
Conceptual Modelling in Information Systems Engineering
Conceptual modeling has always been one of the cornerstones for information systems engineering as it describes the general knowledge of the system in the so-called conceptual schema.

Krogstie, Opdahl and Brinkkemper compiled 20 contributions from renowned researchers covering all aspects of conceptual modeling on the occasion of Arne...

I Married an eBay Maniac
I Married an eBay Maniac
Has your spouse been spending more and more time on the computer? Do they hide the screen when you walk in the room? Have new items been appearing in your house while your older possessions seem to disappear? Perhaps the explanation is in "it" - eBay mania! 

 

I Married...

Visual Basic 2005 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
Visual Basic 2005 Recipes: A Problem-Solution Approach (Expert's Voice in .Net)
Attempting to learn all there is to know about developing VB .NET applications using the Microsoft .NET Framework would be an incredibly daunting task. For most of us, the easiest and best approach is to dive in and start writing code. We learn through testing and experimentation, and when we run into the unknown, we search the Internet or grab a...
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Formal Correctness of Security Protocols (Information Security and Cryptography)
Formal Correctness of Security Protocols (Information Security and Cryptography)
Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.

The author investigates proofs of correctness of realistic security protocols in...

Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems...
Professional XNA Game Programming: For Xbox 360 and Windows
Professional XNA Game Programming: For Xbox 360 and Windows

You haven't experienced the full potential of Xbox 360 or Windows until you've created your own homebrewed games for these innovative systems. With Microsoft's new XNA Framework, the only thing limiting you is your imagination. Now professional game developer and Microsoft DirectX MVP Benjamin Nitschke shows you how to take advantage of the XNA...

Beginning Ubuntu Linux, Second Edition (Beginning from Novice to Professional)
Beginning Ubuntu Linux, Second Edition (Beginning from Novice to Professional)
Linux has come a long way in a short time. Computing itself is still relatively young by any standard; if the era of modern computing started with the invention of the microchip, it’s still less than 50 years old. But Linux is a youngster compared even to this; it has been around for only 16 of those years.

In that brief time span,
...
Introduction to C++ Programming and Graphics
Introduction to C++ Programming and Graphics
C++ has grown rapidly in response to the practical need for a programming language that is able to efficiently handle composite and diverse data types. Today, C++ dominates the commercial market and is favored among application developers.

Introduction to C++ Programming and Graphics offers a venue for rapidly learning the...

CCNP ONT Official Exam Certification Guide
CCNP ONT Official Exam Certification Guide
CCNP ONT Official Exam Certification Guide is an excellent self-study resource for the 642-845 ONT exam. Passing the exam certifies that the successful candidate has important knowledge and skills in optimizing and providing effective QoS techniques for converged networks. Passing the exam is one of the requirements for the Cisco Certified Network...
Fun with Algorithms: 4th International Conference, FUN 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings
Fun with Algorithms: 4th International Conference, FUN 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings
This volume contains the papers presented at the Fourth International Conference on Fun with Algorithms (FUN 2007), held June 3–5, 2007 in the beautiful Tuscanian coastal town of Castiglioncello, Italy.

FUN is a three-yearly conference dedicated to the use, design, and analysis of algorithms and data structures, focusing on results
...
Result Page: 749 748 747 746 745 744 743 742 741 740 739 738 737 736 735 734 733 732 731 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy