Home | Amazing | Today | Tags | Publishers | Years | Search 
Object-Oriented and Internet-Based Technologies: 5th Annual International Conference
Object-Oriented and Internet-Based Technologies: 5th Annual International Conference
This book constitutes the refereed proceedings of the 5th Annual International Conference on Object-Oriented and Internet-Based Technologies, Concepts and Applications for a Networked World, Net. Object Days 2004, held in Erfurt, Germany, in September 2004.

The 15 revised full papers presented together with an invited paper were carefully...

A Distributed Pi-Calculus
A Distributed Pi-Calculus
Distributed systems are fast becoming the norm in computer science. Formal mathematical models and theories of distributed behavior are needed in order to understand them. This book proposes a distributed pi-calculus called Dpi, for describing the behavior of mobile agents in a distributed world. It is based on an existing formal language, the...
IP-Traffic Theory and Performance (Signals and Communication Technology)
IP-Traffic Theory and Performance (Signals and Communication Technology)
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.

The book provides an ideal starting point for detailed studies of traffic analysis...

Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts...
Learn MS Access 2000 Programming by Example (With CD-ROM)
Learn MS Access 2000 Programming by Example (With CD-ROM)
Are you ready to go beyond the basics to fully exploit the power of Microsoft Access? Do you want to build powerful applications that provide enhanced functionality and increase user productivity? You can easily make an Access database do a whole lot more than can be achieved with the provided user interface. All you need is this book and a desire...
Strategies for Information Technology and Intellectual Capital
Strategies for Information Technology and Intellectual Capital
"Due to the increasing importance of the intangible assets of a company, firms are now concerned with how best to manage and measure knowledge and other intangibles. In addition to this, information technology has drastically changed the way these measurements are managed. Strategies for Information Technology and Intellectual Capital:...
An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
An Executive's Guide to Information Technology: Principles, Business Models, and Terminology
Assessing the most valuable technology for an organization is becoming a growing challenge for business professionals confronted with an expanding array of options. This book is an A-Z compendium of technological terms written for the non-technical executive, allowing quick identification of what the term is and why it is significant. This is more...
The Scanning Workshop
The Scanning Workshop
The other day, I was talking to someone about this book, and he asked me, “Why are scanners so cheap? Is there some sort of catch?” (He’s my accountant, so he’s paid to ask skeptical questions about money.) The answer is no, there is no catch. Heck, with some scanner models, you don’t even need a computer! Desktop...
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining Using SAS (The Morgan Kaufmann Series in Data Management Systems)
"It is easy to write books that address broad topics and ideas leaving the reader with the question Yes, but how? By combining a comprehensive guide to data preparation for data mining along with specific examples in SAS, Mamdouh's book is a rare finda blend of theory and the practical at the same time. As anyone who has mined data will...
Professional CodeIgniter
Professional CodeIgniter
If you’re a PHP developer, you can build Rails-like applications without learning a new language by following the hands-on tutorials in Professional CodeIgniter. In this book, find an overview of MVC and agile technologies, model and schema for products, helpers and libraries, Ajax and Scriptaculous, and explanations of the creation...
Problems & Solutions In Scientific Computing With C++ And Java Simulations
Problems & Solutions In Scientific Computing With C++ And Java Simulations
Scientific computing is a collection of tools, techniques and theories required to develop and solve mathematical models in science and engineering on a computer. The purpose of this book is to supply a collection of problems together with their detailed solution which will prove to be valuable to students as well as to research workers in the...
Exploring IBM eServer pSeries: The Instant Insider's Guide to IBM's Family of UNIX Servers
Exploring IBM eServer pSeries: The Instant Insider's Guide to IBM's Family of UNIX Servers
The eServer pSeries is IBM’s strategic family of UNIX computers. This updated overview and reference discusses the latest pSeries models, options, disk storage, printers, tape drives, UNIX operating system enhancements, e-business software, displays, network stations, and much more. Also addressed are business issues such as leasing versus...
Result Page: 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy