Home | Amazing | Today | Tags | Publishers | Years | Search 
Ontology-based Application Integration
Ontology-based Application Integration

There is probably no invention in the history of mankind that had such a profound impact on our lives in such a short time as the World Wide Web. Twenty years ago, Tim Berners-Lee has developed the first versions of HTML which allowed to weave documents into the large hypertext document that we know today. It was soon realized that...

The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions

Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled with countless stories of product successes and failures— fickle consumer adoptions, clever marketing campaigns that outsmart the best technologies, better packaging winning over better technology, and products that are simply...

VLSI Physical Design: From Graph Partitioning to Timing Closure
VLSI Physical Design: From Graph Partitioning to Timing Closure

Physical design of integrated circuits remains one of the most interesting and challenging arenas in the field of Electronic Design Automation. The ability to integrate more and more devices on our silicon chips requires the algorithms to continuously scale up. Nowadays we can integrate 2e9 transistors on a single 45nm-technology chip. This...

Dynamic Taxonomies and Faceted Search: Theory, Practice, and Experience (The Information Retrieval Series)
Dynamic Taxonomies and Faceted Search: Theory, Practice, and Experience (The Information Retrieval Series)

Current search paradigms for the Web, direct access through search engines and navigational access via static taxonomies, have recently been strongly criticized. A third paradigm, dynamic taxonomies or faceted search, is gaining acceptance to the extent that it is now the de facto standard in product selection for e-commerce. This new...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

Development with the Force.com Platform: Building Business Applications in the Cloud (2nd Edition)
Development with the Force.com Platform: Building Business Applications in the Cloud (2nd Edition)

Build Powerful, Scalable, Cloud-Based Enterprise Solutions Fast with the Newest Version of Force.com

 

Using Force.com, you can build enterprise applications with world-class value, scalability, and reliability--and do it in days or weeks, not months...

Practical Data Analysis with JMP
Practical Data Analysis with JMP

Being an effective analyst or a well-informed consumer of analyses requires that you know how to properly define the problem, apply suitable statistical techniques, and clearly and honestly communicate the results. Being a well-informed consumer of analyses requires the same skills so that you can recognize them in action. Robert Carver's...

Building and Testing with Gradle
Building and Testing with Gradle

This book has a very clear aim: introduce you to the incredible simplicity and power of Gradle.

Gradle is a flexible yet model-driven JVM-based build tool. Gradle acknowledges and improves on the very best ideas from Make, Ant, Ivy, Maven, Rake, Gant, Scons, SBT, Leinengen, and Buildr. The best-of-breed features previously...

Digital Design (VHDL): An Embedded Systems Approach Using VHDL
Digital Design (VHDL): An Embedded Systems Approach Using VHDL

This book provides a foundation in digital design for students in computer engineering, electrical engineering and computer science courses. It deals with digital design as an activity in a larger systems design context. Instead of focusing on gate-level design and aspects of digital design that have diminishing relevance in a...

Cyber Security Essentials
Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...

Robot Development Using Microsoft Robotics Developer Studio
Robot Development Using Microsoft Robotics Developer Studio

This book has evolved from class notes for the undergraduate Automation and Robotics course at the National Taiwan University. The course was originally designed for senior students in the Department of Civil Engineering, enhancing their understanding of robotics technology and its potential. As this course does not have any...

Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Result Page: 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy