Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agent-based Supply Network Event Management
Agent-based Supply Network Event Management
"Supply Chain Event Management (SCEM)" is one of the major topics in application-oriented Supply Chain Management. However, many solutions lack conceptual precision and currently available client-server SCEM-systems are ill-suited for complex supply networks in today's business environment. Agent-based proactive information logistics...
Java Programming: From The Ground Up
Java Programming: From The Ground Up

Java Programming: From the Ground Up begins with the fundamentals of programming, moves through the object-oriented paradigm, and concludes with an introduction to graphics and event-driven programming. The broad coverage of topics as well as the modularity of the text makes the book suitable for both introductory and intermediatelevel...

Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Over the last two or three decades, elliptic curves have been playing an increasingly important role both in number theory and in related fields such as cryptography. For example, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality...
Systems Programming: Designing and Developing Distributed Applications
Systems Programming: Designing and Developing Distributed Applications

Systems Programming: Designing and Developing Distributed Applications explains how the development of distributed applications depends on a foundational understanding of the relationship among operating systems, networking, distributed systems, and programming. Uniquely organized around four viewpoints (process, communication,...

Pro JavaFX Platform: Script, Desktop and Mobile RIA with Java Technology
Pro JavaFX Platform: Script, Desktop and Mobile RIA with Java Technology
JavaFX was born amid a particularly interesting confluence of upheavals in the technology industry and the way commerce was conducted in the developed world. At the turn of the twenty-first century, companies were looking for ways to do business directly with their customers. Whether they had goods to sell, information to impart, or entertainment...
Better PowerPoint (R): Quick Fixes Based On How Your Audience Thinks
Better PowerPoint (R): Quick Fixes Based On How Your Audience Thinks

Presentations: We´ve all sat through them, wondering why we´re there; or we´ve given them, wondering whether the audience cares. This is a book about how to make presentations effective and therefore more interesting to the audience members.

Years ago, I was at a conference where one of the most...

Intelligent Scene Modelling Information Systems (Studies in Computational Intelligence)
Intelligent Scene Modelling Information Systems (Studies in Computational Intelligence)
Scene modeling is a very important part in Computer Graphics because it all ows creating more or less complex models to be rendered, coming from the real world or from the designer’s imagination. However, scene modeling is a very difficult task, asthere is a need of more and more complex scenes and traditional geometric modelers are not well...
Next Generation Wireless Applications
Next Generation Wireless Applications
"There is no other book I've come across that offers this breadth of knowledge and makes you that excited about the possibilities in this fast paced market. Next Generation Wireless Applications is written in a very accessible way and packed full of useful insights from the author reflecting his extensive experience...
Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
Critical Information Infrastructures: Resilience and Protection
Critical Information Infrastructures: Resilience and Protection
A very interesting and informative book that covers a wide but interlinked set of subjects. Indeed, attention has been paid to assisting the reader to understand complex and current issues, and it can be said that the work is extremely well researched, up-to-date and of interest to a wide audience including practising managers, government...
Dynamic Epistemic Logic (Synthese Library)
Dynamic Epistemic Logic (Synthese Library)
"I am very glad to see that three people so active in this area of knowledge update are bringing out this book. It should be of great help to graduate students as well as established researchers." Rohit Parikh, Distinguished Professor, City University of New York Dynamic Epistemic Logic is the logic of knowledge change. This...
Best Jobs for the 21st Century
Best Jobs for the 21st Century
We kept this introduction short to encourage you to actually read it. For this reason, we don’t provide many details on the technical issues involved in creating the job lists or descriptions. Instead, we give you short explanations to help you understand and use the information the book provides for career exploration or planning. We think...
unlimited object storage image
Result Page: 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy