Home | Amazing | Today | Tags | Publishers | Years | Search 
Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference
Security Technology: International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference

We would like to welcome you to the proceedings of the 2009 International Conference on Security Technology (SecTech 2009), which was organized as part of the 2009 International Mega-Conference on Future Generation Information Technology (FGIT 2009), held during December 10–12, 2009, at the International Convention Center Jeju,...

Security on the Web, Volume 83 (Advances in Computers)
Security on the Web, Volume 83 (Advances in Computers)

This is Volume 83 of the Advances in Computers, subtitled Security on the Web. This series, continuously published since 1960, is the oldest series covering the development of the computer industry. With the impact that the World Wide Web has on every facet of our lives today, this volume focuses on the security aspect of computing....

Scheduling: Theory, Algorithms, and Systems
Scheduling: Theory, Algorithms, and Systems

Sequencing and scheduling is a formof decision-making that plays a crucial role in manufacturing and service industries. In the current competitive environment effective sequencing and scheduling has become a necessity for survival in the market-place. Companies have to meet shipping dates that have been committed to customers, as failure to...

Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)
Tried and True Object Development: Industry-Proven Approaches with UML (SIGS: Managing Object Technology)

Written by four experienced Nokia Telecommunications software developers, this practical book focuses on object-based and component-based software development. The authors concentrate on the most important issues in real-life software development, such as the development process itself, software architecture, the development of user...

Data Analysis with Open Source Tools
Data Analysis with Open Source Tools

THIS BOOK GREW OUT OFMY EXPERIENCE OF WORKING WITH DATA FOR VARIOUS COMPANIES IN THE TECH industry. It is a collection of those concepts and techniques that I have found to be the most useful, including many topics that I wish I had known earlier—but didn’t.

My degree is in physics, but I also worked as a software...

Information Systems Project Management: How to Deliver Function and Value in Information Technology Projects
Information Systems Project Management: How to Deliver Function and Value in Information Technology Projects

Congratulations. You have been given your own project to run. If you are like most project managers, part of you is elated that your company has entrusted you with an important assignment, while the rest of you is petrified that it will soon discover the magnitude of its error. Whether the project is your first and you are being...

Using AutoCAD 2011
Using AutoCAD 2011

With more than four million users around the world, AutoCAD offers engineers, architects, drafters, interior designers, and many others, a fast, accurate, and versatile drafting and modeling tool.

Now in its 18th edition, Using AutoCAD 2011 makes using AutoCAD a snap, by presenting easy-tomaster, step-by-step tutorials covering...

Green IT in Practice
Green IT in Practice

There is a scientific consensus that we need to act rapidly to cut carbon dioxide emissions if we are to limit the most extreme effects of climate change. The IT sector is in a unique position to act as a catalyst for this change. By implementing simple efficiencies, the sector can reduce its carbon footprint – which currently...

Human-in-the-Loop Simulations: Methods and Practice
Human-in-the-Loop Simulations: Methods and Practice

Both the editors of this book were exposed to human-in-the-loop simulations while pursuing their doctoral degrees in the Center for Human-Machine Systems at Georgia Tech. In fact, S. Narayanan served as Ling Rothrock’s teaching assistant for the simulation course taught by Prof. Christine Mitchell. It has been over 15 years...

C# Programming: From Problem Analysis to Program Design
C# Programming: From Problem Analysis to Program Design

C# Programming: From Problem Analysis to Program Design requires no previous introduction to programming and only a mathematical background of high school algebra. The book uses C# as the programming language for software development; however, the basic programming concepts presented can be applied to a number of other languages....

Advanced Database Query Systems: Techniques, Applications and Technologies (Premier Reference Source)
Advanced Database Query Systems: Techniques, Applications and Technologies (Premier Reference Source)

Databases are designed to support data storage, processing, and retrieval activities related to data management. The use of databases in various applications has resulted in an enormous wealth of data, which populates many types of databases around the world.

Advanced Database Query Systems: Techniques, Applications and...

Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)
Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)

The chapters in this volume were presented at the July–August 2006 NATO Advanced Study Institute on Imaging for Detection and Identification. The conference was held at the beautiful Il Ciocco resort near Lucca, in the glorious Tuscany region of northern Italy. For the eighth time we gathered at this idyllic spot to explore and...

Result Page: 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy