Home | Amazing | Today | Tags | Publishers | Years | Search 
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

Murach's HTML, XHTML, and CSS (Web Programming)
Murach's HTML, XHTML, and CSS (Web Programming)

If you have anything to do with web development, you should know how to use HTML. XHTML, and CSS the modern, professional way. That's true if you want to become a web designer. That's true for web designers who still use tables for page layout when they should be using CSS. That's true for JavaScript programmers. And that's...

High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)
High-Throughput Image Reconstruction and Analysis (Bioinformatics & Biomedical Imaging)

Progress in biology is dependent on the ability to observe, measure, and model the behavior of organisms at multiple levels of abstraction, from the microscopic to the macroscopic. There has been a tremendous growth recently in the techniques to probe the structure and workings of cellular and organ-level mechanisms. Significant advances have...

Oracle Siebel CRM 8 Developer's Handbook
Oracle Siebel CRM 8 Developer's Handbook

Siebel CRM, Oracles' market-leading Customer Relationship Management software, can be tailored to customers needs. In this book, the ambitious developer will learn how to safely implement customer requirements in Siebel CRM using Siebel Tools, Siebel's own integrated development environment.

This book is a complete...

Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

Change Management for Semantic Web Services
Change Management for Semantic Web Services

Software automates a wide variety of business processes in modern enterprises. Changes made to software are, in effect, changes made to the business processes themselves that govern and automate the internal and external operations of an organization.Without a proper disciplined approach to change management, enterprises lack a full...

PayPal APIs: Up and Running: A Developer's Guide
PayPal APIs: Up and Running: A Developer's Guide

Virtually every application delivery model is experiencing a surging demand for transaction convenience. In this book, I introduce PayPal APIs, along with instructions and resources for their integration in different environments, including websites and mobile applications.

The goal of this book is to help you understand...

iPad 2: The Missing Manual
iPad 2: The Missing Manual

Steve Jobs revealed the original iPad on January 27, 2010, finally confirming rumors that had been swirling for years: Apple was making a tablet computer! And when that first iPad model hit stores a few months later, the public snapped up 300,000 the day it went on sale.

Less than a year later after the first one arrived, Apple put...

Performance Testing Guidance for Web Applications
Performance Testing Guidance for Web Applications

Performance Testing Guidance for Web Applications provides an end-to-end approach for implementing performance testing. Whether you are new to performance testing or looking for ways to improve your current performance-testing approach, you will gain insights that you can tailor to your specific scenarios.

The information in this...

A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)

Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.

As the...

Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications

Pattern recognition is a central topic in contemporary computer sciences, with continuously evolving topics, challenges, and methods, including machine learning, content-based image retrieval, and model- and knowledge-based approaches, just to name a few. The Iberoamerican Congress on Pattern Recognition (CIARP) has become established as a...

Cacti 0.8 Beginner's Guide
Cacti 0.8 Beginner's Guide

Generally speaking, network management refers to the tasks associated with running a network, along with the software, tools, and technology required to support these tasks. One major part of running a network is to monitor the devices on it in order to know
what is happening.

One definition of network management from the...

Result Page: 274 273 272 271 270 269 268 267 266 265 264 263 262 261 260 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy