Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Special Edition Using Microsoft Office Excel 2003
Special Edition Using Microsoft Office Excel 2003

Does your life play out in a spreadsheet? Are numbers in columns and rows what make or break you in the work world?

If you answered yes to either of these questions, then Special Edition Using Microsoft Office Excel 2003 is the book that will make it all better. Learn...

Security of Mobile Communications
Security of Mobile Communications

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.

Providing technicians and designers with a...

Professional SQL Server 2005 Programming (Programmer to Programmer)
Professional SQL Server 2005 Programming (Programmer to Programmer)
Professional SQL Server 2005 Programming shows experienced developers how to master the substantially revamped feature set of the latest release of Microsoft SQL Server. The book begins with a concise overview of the new features of SQL Server that is of interest to experienced developers. This is especially important given the substantial...
Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

Database Administration: The Complete Guide to Practices and Procedures
Database Administration: The Complete Guide to Practices and Procedures

"One of Craig's hallmarks is his ability to write in a clear, easy-to-read fashion. The main purpose of any technical book is to transfer information from writer to reader, and Craig has done an excellent job. He wants the reader to learn—and it shows." —Chris Foot, Senior Oracle Certified Instructor,...

Experts and the Will of the People: Society, Populism and Science
Experts and the Will of the People: Society, Populism and Science
The rise of populism in the West has led to attacks on the legitimacy of scientific expertise in political decision making. This book explores the differences between populism and pluralist democracy and their relationship with science. Pluralist democracy is characterised by respect for minority choices and a system of checks and balances that...
Integration as Solution for Advanced Smart Urban Transport Systems: 15th Scientific and Technical Conference “Transport Systems. Theory & Practice ... in Intelligent Systems and Computing (844))
Integration as Solution for Advanced Smart Urban Transport Systems: 15th Scientific and Technical Conference “Transport Systems. Theory & Practice ... in Intelligent Systems and Computing (844))

Methods of advanced data collecting and their analysis, models which help with decision problems as well as technical solutions which improve the integrity of contemporary transport systems at urban area are only some of many problems connected with integration in passenger and freight transport which have been discussed in this...

Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
ASP.NET 3.5 Website Programming: Problem - Design - Solution
ASP.NET 3.5 Website Programming: Problem - Design - Solution

Dear reader, thanks for picking up this book, and welcome to the ASP.NET 3.5 Website Programming: Problem–Design–Solution, fully updated to ASP.NET version 3.5! The idea for this book was born in 2001, with ASP.NET 1.0, from the desire to have a book that teaches how to create real-world web sites. The fi rst edition was published...

Hack Proofing Windows 2000 Server
Hack Proofing Windows 2000 Server
Essential reading for any IT security organization, Hack Proofing Windows 2000 Server takes on a single, vital feature of Windows 2000 Server operations and explains its many aspects, both conceptually and practically. It expertly documents processes and explains complicated architectures through experience and research. The authors include...
Global Positioning Systems, Inertial Navigation, and Integration
Global Positioning Systems, Inertial Navigation, and Integration

An updated guide to GNSS and INS, and solutions to real-world GPS/INS problems with Kalman filtering

Written by recognized authorities in the field, this second edition of a landmark work provides engineers, computer scientists, and others with a working familiarity with the theory and contemporary...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy