Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fundamentals of Database Systems (3rd Edition)
Fundamentals of Database Systems (3rd Edition)
Fundamentals of Database Systems combines clear explanations of theory and design, broad coverage of models and real systems, and excellent examples with up-to-date introductions to modern database technologies. This edition is completely revised and updated, and reflects the latest trends in technological and application development....
Web Site Privacy with P3P
Web Site Privacy with P3P
Introducing the long-awaited first step to personal privacy on the Web!

Privacy on the Internet is a very complicated–and delicate–subject. It is about making sure that sites are honest with the people using their services, and providing the end user with the choice of whether or not to share information with the original server....

Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

Genomics and Proteomics Engineering in Medicine and Biology (IEEE Press Series on Biomedical Engineering)
Genomics and Proteomics Engineering in Medicine and Biology (IEEE Press Series on Biomedical Engineering)

Current applications and recent advances in genomics and proteomics

Genomics and Proteomics Engineering in Medicine and Biology presents a well-rounded, interdisciplinary discussion of a topic that is at the cutting edge of both molecular biology and bioengineering. Compiling contributions by established experts, this...

The Ruby Way
The Ruby Way

The Ruby Way assumes that the reader is already familiar with the subject matter. Using many code samples it focuses on "how-to use Ruby" for specific applications, either as a stand-alone language, or in conjunction with other languages.

Topics covered include:

* Simple data tasks;
* Manipulating structured
...

Linux Cluster Architecture (Kaleidoscope)
Linux Cluster Architecture (Kaleidoscope)
Cluster computers provide a low-cost alternative to multiprocessor systems for many applications. Building a cluster computer is within the reach of any computer user with solid C programming skills and a knowledge of operating systems, hardware, and networking. This book leads you through the design and assembly of such a system, and shows you how...
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."

...

Computing for Numerical Methods Using Visual C++
Computing for Numerical Methods Using Visual C++
A visual, interdisciplinary approach to solving problems in numerical methods

Computing for Numerical Methods Using Visual C++ fills the need for a complete, authoritative book on the visual solutions to problems in numerical methods using C++. In an age of boundless research, there is a need for a programming language that can successfully...

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,...
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
Cooperative Control of Distributed Multi-Agent Systems
Cooperative Control of Distributed Multi-Agent Systems

The paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in...

Technology Enhanced Learning: Best Practices (Knowledge and Learning Society Books)
Technology Enhanced Learning: Best Practices (Knowledge and Learning Society Books)
With the shift towards the knowledge society, the change of working conditions, and the high-speed evolution of information and communication technologies, peoples' knowledge and skills need continuous updating. Learning based on collaborative working, creativity, multidisciplinarity, adaptiveness, intercultural communication, and problem solving...
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy