Home | Amazing | Today | Tags | Publishers | Years | Search 
Error Correction Codes for Non-Volatile Memories
Error Correction Codes for Non-Volatile Memories

Nowadays it is hard to find an electronic device which does not use codes: for example, we listen to music via heavily encoded audio CD's and we watch movies via encoded DVD's. There is at least one area where the use of encoding/decoding is not so developed, yet: Flash non-volatile memories. Flash memory high-density, low power, cost...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Practical Goal Programming (International Series in Operations Research & Management Science)
Practical Goal Programming (International Series in Operations Research & Management Science)

The setting and attainment of goals is a fundamental aspect of human decision making, which is manifest in the modern discipline of operational research by the technique of goal programming. Influences from the fields of mathematical programming and multiple criteria decision making (MCDM) can be found in goal programming, and it is...

Sams Teach Yourself LinkedIn in 10 Minutes (2nd Edition) (Sams Teach Yourself -- Minutes)
Sams Teach Yourself LinkedIn in 10 Minutes (2nd Edition) (Sams Teach Yourself -- Minutes)

Although professionals have always acknowledged the value of networking, today’s economic climate makes developing a solid network even more critical. LinkedIn, the leading social networking site for professionals, is the ideal tool for maximizing the potential of an online network. LinkedIn has more than 85 million members...

Building Enterprise Applications with Windows Presentation Foundation and the Model View ViewModel Pattern
Building Enterprise Applications with Windows Presentation Foundation and the Model View ViewModel Pattern

The Windows Presentation Framework (WPF), Silverlight, and Windows Phone 7 are the latest technologies for building flexible user interfaces (UI) for applications built with Microsoft technology. All three rely on the XAML markup language to describe UI elements and layout, and you can program applications for all three platforms with...

Documents, Presentations, and Workbooks: Using Microsoft Office to Create Content That Gets Noticed
Documents, Presentations, and Workbooks: Using Microsoft Office to Create Content That Gets Noticed

Welcome to the PCs and the Macs. I am delighted to be able to bring you a resource for experienced Microsoft Office users on both platforms. Whether you work only with Microsoft Office 2010 or only with Microsoft Office for Mac 2011, or you work across platforms as I do, this book is for you.

As a document consultant and trainer,...

Internet Information Services Administration
Internet Information Services Administration

Over the last few years, I've found an abundance of books that answer the question, "What can I do when administering Internet Information Server?" But I have yet to find a book that answers the more pertinent question: "What should I do when administering Internet Information Services?" This is the...

Murach's C# 2010
Murach's C# 2010

This is the 2010 edition of Murach's best-selling C# book on developing Windows Forms applications. Here's what developers have said about earlier editions:

"I have to tell you that your C# book is far and away the best resource I have seen to date. It really does do what the learner needs. It is simple,...

E-Mail Security: A Pocket Guide
E-Mail Security: A Pocket Guide

E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...

Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information...

Windows 7 and Vista Guide to Scripting, Automation, and Command Line Tools
Windows 7 and Vista Guide to Scripting, Automation, and Command Line Tools

Although this book has a brand new title, it is really an updated and revised second edition to Windows XP: Under The Hood.The first edition’s automotive-themed title came about because of a certain nostalgia that I felt and I know many people share: Don’t you long for the good-old days when you could pop the hood of your car and...

SharePoint 2010 Disaster Recovery Guide
SharePoint 2010 Disaster Recovery Guide

If you’ve done any previous research on SharePoint disaster recovery topics, such as content recovery, backup and restore, and high availability, you’ve probably found quite a bit of information on the subject. That held true for us when we wrote the original Disaster Recovery Guide for SharePoint 2007, and it’s just as true...

Result Page: 493 492 491 490 489 488 487 486 485 484 483 482 481 480 479 478 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy