Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Organization and Design, Third Edition: The Hardware/Software Interface, Third Edition
Computer Organization and Design, Third Edition: The Hardware/Software Interface, Third Edition

We believe that learning in computer science and engineering should reflect the current state of the field, as well as introduce the principles that are shaping computing. We also feel that readers in every specialty of computing need to appreciate the organizational paradigms that determine the capabilities, performance, and,...

The Blackwell Encyclopedic Dictionary of Finance (Blackwell Encyclopedia of Management)
The Blackwell Encyclopedic Dictionary of Finance (Blackwell Encyclopedia of Management)

Although the basic purposes of finance, and the nature of the core instruments used in attaining them, are relatively constant, recent years have seen an explosion in complexity of both products and techniques.

A number of forces are driving this explosion. The first is internationalization encompassing a dramatic growth in...

How Do Witches Fly? A practical approach to nocturnal flights.
How Do Witches Fly? A practical approach to nocturnal flights.

Books which examine the folklore of Europe's traditional "witch" plants are not uncommon, and some give some coverage to describing the psychotropic and hallucinogenic effects of these plants on the human body. However this book is rather more unusual than that in that the author is first and foremost a biochemist with an...

Introducing Character Animation with Blender
Introducing Character Animation with Blender

It’s been five years since the first edition of Introducing Character Animation with Blender came out, and a lot has changed in the world of Blender. Interest in Blender has exploded. When the first edition of this book came out, it was the only English-language book on Blender in print. Now, as this second edition of the book arrives,...

Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011
Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011

concerned with the study of the development and use of advanced information technologies and systems for national, international, and societal security-related applications. In the past few years,we have witnessed that ISI experienced tremendous growth and attracted significant interest involving academic researchers in related fields...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

EJB 3.1 Cookbook
EJB 3.1 Cookbook

Enterprise Java Beans enable rapid and simplified development of secure and portable applications based on Java technology. Creating and using EJBs can be challenging and rewarding. Among the challenges are learning the EJB technology itself, learning how to use the development environment you have chosen for EJB development, and the testing...

Beginning 3D Game Development with Unity: All-in-one, multi-platform game development
Beginning 3D Game Development with Unity: All-in-one, multi-platform game development

Real time 3D games have been around for well over ten years now. We’ve played them, created assets in the style of our favorites, and maybe even “mod”ed a few of them. But until recently, the cost of licensing one of the premier game engines has ranged from several hundred thousand to several million dollars per title...

Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems
Natural Language Processing and Information Systems: 16th International Conference on Applications of Natural Language to Information Systems

The 16th International Conference on Applications of Natural Language to Information Systems (NLDB 2011) was held during June 28–30, 2011, at the University of Alicante, Spain. Since the first NLDB conference in 1995, the main goal has been to provide a forum for the discussion and dissemination of research on the integration of...

Android 3.0 Application Development Cookbook
Android 3.0 Application Development Cookbook

This book covers every aspect of mobile app development, starting with major application components and screen layout and design, before moving on to how to manage sensors such as internal gyroscopes and near field communications. Towards the end, it delves into smartphone multimedia capabilities as well as graphics and animation, web access,...

Fuzzy Logic and Probability Applications: A Practical Guide
Fuzzy Logic and Probability Applications: A Practical Guide

Probability theory and fuzzy logic are the principal components of an array of methodologies for dealing with problems in which uncertainty and imprecision play important roles. In relation to probability theory, fuzzy logic is a new kid on the block. As such, it has been and continues to be, though to a lesser degree, an object of...

Result Page: 178 177 176 175 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy