Home | Amazing | Today | Tags | Publishers | Years | Search 
How to Succeed in Business Using LinkedIn: Making Connections and Capturing Opportunities on the World's #1 Business Networking Site
How to Succeed in Business Using LinkedIn: Making Connections and Capturing Opportunities on the World's #1 Business Networking Site

You may have heard about social networking sites on the Web. If you view a list of social networking Web sites (http://en.wikipedia.org/wiki/List_of_social_networking_ websites) on Wikipedia, a popular reference site, you will see links to more than 100 networking sites, available from around the world and catering to every taste. The...

Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)

Few technical lerms have gained such rapid notoriety as the appela tion "NP-complete." In the short lime since its introduction in the early 1970's, this term has come to symbolize the abyss of inherent intractability that algorithm designers increasingly face as they seek to solve larger and more complex problems. A...

VMware vSphere PowerCLI Reference: Automating vSphere Administration
VMware vSphere PowerCLI Reference: Automating vSphere Administration

The book is, of course, primarily targeted at administrators of vSphere environments who want to automate tasks. But the subjects that we discuss in the book cover so many aspects of the management of a VMware vSphere environment that everyone who comes into contact with a VMware vSphere environment will be able to pick up something...

Windows PowerShell in Action, Second Edition
Windows PowerShell in Action, Second Edition

Well, it’s been a wild ride since the first edition of this book was released. At that time, PowerShell had just shipped and had a fairly limited scope of influence. Things have changed a lot. PowerShell now ships in the box with Windows (at least Windows 7 and Server 2008 R2). The number of PowerShell users is now in the hundreds...

Design of High-Speed Communication Circuits (Selcted Topics in Electronics and Systems)
Design of High-Speed Communication Circuits (Selcted Topics in Electronics and Systems)

Welcome to the special issue of the International Journal of High Speed Electronics and Systems on "High-Speed Mixed-Signal Integrated Circuits". Silicon, in particular MOS silicon, has rapidly become the de facto technology for mixed-signal integrated circuit design due to the high levels of integration possible as device...

Phase Transitions in Machine Learning
Phase Transitions in Machine Learning

From its inception in the 1930s, the rich and vigorous field of computer science has been concerned with the resources, both in time and in memory, needed to carry out a computation. A number of fundamental theorems were discovered that resorted to a worst-case analysis. The central question was whether a given algorithm could be...

Digital Piracy (Cybersafety)
Digital Piracy (Cybersafety)

The Internet has had and will continue to have a profound effect on society. It is hard to imagine life without such technologies as computers, cell phones, gaming devices, and so on. The Internet, World Wide Web, and their associated technologies have altered our social and personal experience of the world. In no other time in...

Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)
Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)

Welcome to Introducing Autodesk Maya 2012 and the world of computer-generated imagery (CGI). Whether you’re new to 3D graphics or venturing into Autodesk’s powerhouse animation software from another 3D application, you’ll find this book a perfect primer. It introduces you to Maya and shows how you can work with Maya to...

Introduction to Cryptography (Undergraduate Texts in Mathematics)
Introduction to Cryptography (Undergraduate Texts in Mathematics)

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Big Java: Compatible with Java 5, 6 and 7
Big Java: Compatible with Java 5, 6 and 7

This book introduces programmers to objects at a gradual pace. The syntax boxes are revised to show typical code examples rather than abstract notation. This includes optional example modules using Alice and Greenfoot. The examples feature annotations with dos and don'ts along with cross references to more detailed explanations in the...

Heterogeneous Computing with OpenCL
Heterogeneous Computing with OpenCL

Our world is heterogeneous in nature. This kind of diversity provides a richness and detail that is difficult to describe. At the same time, it provides a level of complexity and interaction in which a wide range of different entities are optimized for specific tasks and environments.

In computing, heterogeneous computer...

Result Page: 275 274 273 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy