Home | Amazing | Today | Tags | Publishers | Years | Search 
Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)
Imaging for Detection and Identification (NATO Security through Science Series B: Physics and Biophysics)

The chapters in this volume were presented at the July–August 2006 NATO Advanced Study Institute on Imaging for Detection and Identification. The conference was held at the beautiful Il Ciocco resort near Lucca, in the glorious Tuscany region of northern Italy. For the eighth time we gathered at this idyllic spot to explore and...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Algorithmic Graph Theory and Perfect Graphs (Computer science and applied mathematics)
Algorithmic Graph Theory and Perfect Graphs (Computer science and applied mathematics)

Algorithmic Graph Theory and Perfect Graphs, first published in 1980, has become the classic introduction to the field. This new Annals edition continues to convey the message that intersection graph models are a necessary and important tool for solving real-world problems. It remains a stepping stone from which the reader may embark on one...

Mastering VBA for Office 2010
Mastering VBA for Office 2010

Visual Basic for Applications (VBA) is a powerful tool that enables you to automate operations in the Microsoft Offi ce applications and in other applications that host VBA. By automating operations using VBA, you can save yourself and your colleagues huge amounts of time and effort. Getting more work done in less time is usually good...

Data Analysis with Open Source Tools
Data Analysis with Open Source Tools

THIS BOOK GREW OUT OFMY EXPERIENCE OF WORKING WITH DATA FOR VARIOUS COMPANIES IN THE TECH industry. It is a collection of those concepts and techniques that I have found to be the most useful, including many topics that I wish I had known earlier—but didn’t.

My degree is in physics, but I also worked as a software...

Grid Computing: Towards a Global Interconnected Infrastructure (Computer Communications and Networks)
Grid Computing: Towards a Global Interconnected Infrastructure (Computer Communications and Networks)

Grid Computing was a vision of using and sharing computers and data in the early 1990s. The integration, coordination, and sharing of computer resources which are geographically disperse among different physical domains and organizations became an every day reality. This emerging infrastructure aims to provide a mechanism for sharing...

The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions

Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled with countless stories of product successes and failures— fickle consumer adoptions, clever marketing campaigns that outsmart the best technologies, better packaging winning over better technology, and products that are simply...

Professional Plone 4 Development
Professional Plone 4 Development

I suspect Martin plied me to write this foreword while out one evening during the 2010 Plone Conference in Bristol. Full from an excellent dinner and even better conversation, beer in hand, who could say no?

I've long envied Martin's ability to write. Text and code flow from his fingers at a rate that I can't even begin...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

C++ How to Program (8th Edition)
C++ How to Program (8th Edition)

Welcome to the C++ computer programming language and C++ How to Program, Eighth Edition! This book presents leading-edge computing technologies, and is particularly appropriate for inroductory course sequences based on the curriculum recommendations of two key professional organizations—the ACM and the IEEE.

The new...

Internet & World Wide Web: How to Program (4th Edition)
Internet & World Wide Web: How to Program (4th Edition)

Welcome to Internet and web programming and Internet & WorldWide Web How to Program, Fourth Edition! At Deitel & Associates, we write programming language textbooks and professional books for Prentice Hall, deliver corporate training worldwide and develop Web 2.0 Internet businesses. The book has been...

Leading the Virtual Workforce: How Great Leaders Transform Organizations in the 21st Century
Leading the Virtual Workforce: How Great Leaders Transform Organizations in the 21st Century

As it turns out Bennis underestimated the impact that bad leadership can have. A combination of greed, hubris, flawed judgment, and miscalculation has made the Enron debacle seem almost quaint by comparison to the global financial crisis that we now face. Although numerous pundits and scholars have advanced many reasons for the...

Result Page: 290 289 288 287 286 285 284 283 282 281 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy