Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply...

Fast Reliable Algorithms for Matrices with Structure (Advances in Design and Control)
Fast Reliable Algorithms for Matrices with Structure (Advances in Design and Control)
This book is the first to pay special attention to the combined issues of speed and numerical reliability in algorithm development. These two requirements have often been regarded as competitive, so much so that the design of fast and numerically reliable algorithms for large-scale structured systems of linear equations, in many cases, remains a...
Handbook of Pattern Recognition and Computer Vision
Handbook of Pattern Recognition and Computer Vision

Dedicated to the memory of the late Professor King Sun Fu (1930-1985), the handbook series, with first edition (1993), second edition (1999) and third edition (2005), provides a comprehensive, concise and balanced coverage of the progress and achievements in the field of pattern recognition and computer vision in the last twenty years. This is a...

State Space Consistency and Differentiability (SpringerBriefs in Optimization)
State Space Consistency and Differentiability (SpringerBriefs in Optimization)

​By investigating the properties of the natural state, this book presents an analysis of input-output systems with regard to the mathematical concept of state. The state of a system condenses the effects of past inputs to the system in a useful manner. This monograph emphasizes two main properties of the natural state; the...

Mrsa
Mrsa

Responding to the growing concern about the increased frequency and resistance of MRSA infections, this invaluable source analyzes the latest developments in the identification, assessment, and management of methicillin-resistant Staphylococcus aureus (MRSA) by leading authorities on the topic.

...
Artificial Intelligence and Soft Computing -- ICAISC 2004: 7th International Conference, Zakopane, Poland, June 7-11, 2004
Artificial Intelligence and Soft Computing -- ICAISC 2004: 7th International Conference, Zakopane, Poland, June 7-11, 2004
This book constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Soft Computing, ICAISC 2004, held in Zakopane, Poland in June 2004.

The 172 revised contributed papers presented together with 17 invited papers were carefully reviewed and selected from 250 submissions. The papers are organized in...

Chipless RFID: Design Procedure and Detection Techniques
Chipless RFID: Design Procedure and Detection Techniques

This book examines the design of chipless RFID systems. The authors begin with the philosophy of RFID and its effect on commercial applications. Then, they discuss the chipless RFID systems and the application of chipless RFID systems, the advantages it provides compared to conventional barcode ID and chipped RFID tags. The text then covers...

Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.

The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following
...
Liquid Crystalline Polymers
Liquid Crystalline Polymers
"Their book is a most useful resource for approaching a large literature that even a specialist needs help to assimilate. -- Professor Mark Warner, Cavendish Laboratory Cambridge, UK

This textbook consists of six chapters. The first chapter highlights the concept of liquid crystals, including chemical structure, phase
...
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)

An in-depth examination of the cutting edge of biometrics

This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:

Chemical testing of textiles (Woodhead Publishing Series in Textiles)
Chemical testing of textiles (Woodhead Publishing Series in Textiles)
It has long been my desire to contribute to a textbook that is solely devoted to the chemical analysis of textiles. Thus, when Woodhead Publishing contacted me about editing this book, I enthusiastically accepted the offer. Now, with the hard work of a team of contributors who are professors, material researchers and textile analysts from...
Access Control Systems: Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models
Secure identification of users, programming agents, hosts, and networking devices is considered the core element of computing security. Rarely is anonymity a desired goal of systems, networks, and applications. This aspect is dictated largely by the extent in which computing has evolved to automate many facets of critical human activities, such as...
unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy