Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Processing and Security Systems
Information Processing and Security Systems

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in...

Cryptanalysis of RSA and Its Variants
Cryptanalysis of RSA and Its Variants

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its...

Java in Two Semesters: Featuring JavaFX (Texts in Computer Science)
Java in Two Semesters: Featuring JavaFX (Texts in Computer Science)

This easy-to-follow textbook teaches Java programming from first principles, as well as covering design and testing methodologies. The text is divided into two parts. Each part supports a one-semester module, the first part addressing fundamental programming concepts, and the second part building on this foundation, teaching the...

Head First Rails: A learner's companion to Ruby on Rails (Brain-Friendly Guides)
Head First Rails: A learner's companion to Ruby on Rails (Brain-Friendly Guides)
Ready to transport your web applications into the Web 2.0 era? Head First Rails takes your programming -- and productivity -- to the max. You'll learn everything from the fundamentals of Rails scaffolding to building customized interactive web apps using Rails' rich set of tools and the MVC framework.

By the time you're
...
Model-Based Design for Embedded Systems (Computational Analysis, Synthesis, and Design of Dynamic Systems)
Model-Based Design for Embedded Systems (Computational Analysis, Synthesis, and Design of Dynamic Systems)

The demands of increasingly complex embedded systems and associated performance computations have resulted in the development of heterogeneous computing architectures that often integrate several types of processors, analog and digital electronic components, and mechanical and optical components—all on a single chip. As a result, now the...

JUNOS Security
JUNOS Security

Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...

Clojure for Java Developers
Clojure for Java Developers

Key Features

  • Write apps for the multithreaded world with Clojure's flavor of functional programming
  • Discover Clojure's features and advantages and use them in your existing projects
  • The book is designed so that you'll be able put to use your existing skills and software knowledge...
Electronic Design Automation of Analog ICs combining Gradient Models with Multi-Objective Evolutionary Algorithms (SpringerBriefs in Applied Sciences and Technology)
Electronic Design Automation of Analog ICs combining Gradient Models with Multi-Objective Evolutionary Algorithms (SpringerBriefs in Applied Sciences and Technology)
This book applies to the scientific area of electronic design automation (EDA) and addresses the automatic sizing of analog integrated circuits (ICs). Particularly, this book presents an approach to enhance a state-of-the-art layout-aware circuit-level optimizer (GENOM-POF), by embedding statistical knowledge from an automatically generated...
Alkane Functionalization
Alkane Functionalization

Presents state-of-the-art information concerning the syntheses of valuable functionalized organic compounds from alkanes, with a focus on simple, mild, and green catalytic processes

Alkane Functionalization offers a comprehensive review of the state-of-the-art of catalytic functionalization of...

Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Adobe Photoshop Elements 8 for Photographers
Adobe Photoshop Elements 8 for Photographers

If you're new to Elements and need a complete overview of each feature and function, you'll find exactly what you're looking for here: step-by-step instructions covering every aspect of Elements, accompanied by helpful screenshots and colorful images. If you're a more experienced user, you'll find Philip's signature...

Facebook: The Missing Manual (Missing Manuals)
Facebook: The Missing Manual (Missing Manuals)

Facebook's spreading about as far and fast as the Web itself: 500 million members and counting. But there's a world of fun packed into the site that most folks miss. With this bestselling guide, learn how to unlock Facebook's talents as personal website creator, souped-up address book, and bustling community forum....

unlimited object storage image
Result Page: 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy