Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
General Theory of Information Transfer and Combinatorics (Lecture Notes in Computer Science)
General Theory of Information Transfer and Combinatorics (Lecture Notes in Computer Science)
This book constitutes the thoroughly refereed research papers contributed to a research project on the `General Theory of Information Transfer and Combinatorics' that was hosted from 2001-2004 at the Center for Interdisciplinary Research (ZIF) of Bielefeld University and also papers of several incorporated meetings thereof.

The 63 revised full...

Genomic Perl: From Bioinformatics Basics to Working Code
Genomic Perl: From Bioinformatics Basics to Working Code

"I found this to be an excellent book, and would not hesitate to recommend it to advanced undergraduate and postgraduate students." Saturnino Luz, Computing Reviews

In this introduction to computational molecular biology, Rex Dwyer explains many basic computational problems and gives concise, working programs to
...

Security for Web Services and Service-Oriented Architectures
Security for Web Services and Service-Oriented Architectures

Web services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with...

Biological Control of Insect Pests Using Egg Parasitoids
Biological Control of Insect Pests Using Egg Parasitoids

The theme of the book is highly relevant to the current emphasis on environment conservation, with focus on native biodiversity conservation in agro-ecosystems. The current impetus being given to organic farming and export oriented agri-hortculture in the country calls for access to relevant scientific knowledge base among the stakeholders....

Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this...

Aix and Linux Interoperabilty
Aix and Linux Interoperabilty
This IBMR Redbook discusses interoperability in terms of UNIX to UNIX cross platform data sharing and user/system management. This redbook also demonstrates the similarities and differences between the AIXR and Linux operating systems.

This redbook is intended to help IT specialists who have AIX systems and Linux systems in their
...
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in...

Advanced Digital Signal Processing and Noise Reduction
Advanced Digital Signal Processing and Noise Reduction

Digital signal processing plays a central role in the development of modern communication and information processing systems. The theory and application of signal processing is concerned with the identification, modelling and utilisation of patterns and structures in a signal process. The observation signals are often distorted, incomplete...

Unity 5.x Cookbook
Unity 5.x Cookbook

Over 100 recipes exploring the new and exciting features of Unity 5 to spice up your Unity skillset

About This Book

  • Built on the solid foundation of the popular Unity 4.x Cookbook, the recipes in this edition have been completely updated for Unity 5
  • Features recipes for both 2D and 3D...
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
Understanding Digital Television: An Introduction to DVB Systems with Satellite, Cable, Broadband and Terrestrial TV Distribution
Understanding Digital Television: An Introduction to DVB Systems with Satellite, Cable, Broadband and Terrestrial TV Distribution
By the end of the 1960s, when I started to get interested in how the TV set at home really worked, color television and the second national TV channel was introduced in Sweden. The old medium-wave radio, with glowing electron tubes underneath its cover, made it possible to listen to voices from distant countries, but the TV programming choices were...
Building Web and Mobile ArcGIS Server Applications with JavaScript
Building Web and Mobile ArcGIS Server Applications with JavaScript

Improve your knowledge and career prospects in web or mobile application development with this step-by-step practical guide to ArcGIS Server. Gives a good grounding in everything from creating maps to network analysis.

Overview

  • Develop ArcGIS Server applications with JavaScript, both for traditional web...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy