Home | Amazing | Today | Tags | Publishers | Years | Search 
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines...

Computing: A Concise History (MIT Press Essential Knowledge)
Computing: A Concise History (MIT Press Essential Knowledge)

The history of computing could be told as the story of hardware and software, or the story of the Internet, or the story of "smart" hand-held devices, with subplots involving IBM, Microsoft, Apple, Facebook, and Twitter. In this concise and accessible account of the invention and development of digital technology, computer historian...

Principles of Econometrics
Principles of Econometrics
Principles of Econometrics, 4th edition, is an introductory book for undergraduate students in economics and finance, as well as for first-year graduate students in economics, finance, accounting, agricultural economics, marketing, public policy, sociology, law, and political science. It is assumed that students have taken courses in...
Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)

This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems...

Make: LEGO and Arduino Projects: Projects for extending MINDSTORMS NXT with open-source electronics
Make: LEGO and Arduino Projects: Projects for extending MINDSTORMS NXT with open-source electronics

Make amazing robots and gadgets with two of today’s hottest DIY technologies. With this easy-to-follow guide, you’ll learn how to build devices with Lego Mindstorms NXT 2.0, the Arduino prototyping platform, and some add-on components to bridge the two. Mindstorms alone lets you create incredible gadgets. Bring in Arduino...

High Performance Computing: Programming and Applications (Chapman & Hall/CRC Computational Science)
High Performance Computing: Programming and Applications (Chapman & Hall/CRC Computational Science)

The future of high-performance computing (HPC) lies with large distributed parallel systems with three levels of parallelism, thousands of nodes containing MIMD* groups of SIMD* processors. For the past 50 years, the clock cycle of single processors has decreased steadily and the cost of each processor has decreased. Most applications would...

Geographic Profiling
Geographic Profiling
Scientific criminology has its roots in crime mapping. The first great systematic studies of crime were cartographic exercises made possible by recordkeeping systems created to track criminal convictions in France and England during the early part of the 19th century. Compared with maps of demographic, economic, and social...
Windows Azure programming patterns for Start-ups
Windows Azure programming patterns for Start-ups
Windows Azure was officially announced at PDC 2008, but looking back, I had a quick look in the kitchen of Windows Azure in 2007 while I was visiting Redmond during the Lead Enterprise Architect Program (LEAP) sessions. Pat Helland, a senior architect at Microsoft, gave a talk on The irresistible forces meet the movable objects....
Visual Basic 2012 Programmer's Reference
Visual Basic 2012 Programmer's Reference
IT HAS BEEN SAID THAT SIR ISAAC NEWTON was the last person to know everything. He was an accomplished physicist (his three laws of motion were the basis of classical mechanics, which defi ned astrophysics for three centuries), mathematician (he was one of the inventors of calculus and developed Newton’s Method for fi nding...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
The Archaeology of Athens
The Archaeology of Athens
The city of Athens has played a leading role in the development of European civilization. When we look back through time to the origins of so many of the institutions and activities which thrive or are valued today, we are led to ancient Greece and, most often, to Athens in the Classical period (480–323 B.C.). Time and again...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy