Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Android 3
Beginning Android 3

Android is everywhere. Phones. Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars and all sort of other places as well. However, the general theme of Android devices will be smaller screens and/or no hardware keyboard. And, by the numbers, Android will probably be associated mostly with smartphones for...

Linking Government Data
Linking Government Data

The Linked Open Data Project started just four years ago in 2007. In that short time Linked Data has grown into an almost mainstream activity for many governments around the world. As of this writing, the US Government’s open data site listed twenty one countries whose governments publish open data regarding the operations of...

Switching to a Mac Portable Genius
Switching to a Mac Portable Genius

The stats tell us that people are switching from Windows to the Mac in record numbers, but those stats don’t tell us why. Perhaps it’s because Windows users would like to actually enjoy using a computer for a change. Perhaps it’s because Macs just work: you take them out of the box, plug them in, and within minutes...

The Mathematics of Gambling
The Mathematics of Gambling

Casino card games such as baccarat and blackjack differ significantly from casino games such as craps, roulette, and slot machines in that they are not indepen- dent trial processes-that is, the cards that already have been played do affect the odds on subsequent hands. Consider for a moment the game of blackjack, where the cards...

Introduction to Cryptography with Coding Theory
Introduction to Cryptography with Coding Theory

This book is based on a course in cryptography at the upper level under graduate and beginning graduate level that has been given at the University of Maryland since 1997. When designing the course, we decided on the fol lowing requirements.

• The course should be up-to-date and cover a broad selection of topics from a...

Program Derivation: The Development of Programs from Specifications (International Computer Science Series)
Program Derivation: The Development of Programs from Specifications (International Computer Science Series)

The primary aim of this book is to make the principles of program derivation from specifications accessible to undergraduates early in their study of computing science.

The proliferation of personal computers in the home and in schools has meant that there are large numbers of people who have had exposure to using computers...

Visualize This: The FlowingData Guide to Design, Visualization, and Statistics
Visualize This: The FlowingData Guide to Design, Visualization, and Statistics

Think of all the popular data visualization works out there—the ones that you always hear in lectures or read about in blogs, and the ones that popped into your head as you were reading this sentence. What do they all have in common? They all tell an interesting story. Maybe the story was to convince you of something. Maybe it was to...

Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)
Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)

Excuse me, but who are you, exactly?

You are a father or mother, a son or daughter, husband or wife, a significant other, a rock climber, a kite-flyer, a bicycle enthusiast, a marathon runner, a collector of old movies, a secret novelist, a boxing fan. You are the center of your universe. On the picture collage from the...

CSS for Print Designers
CSS for Print Designers

Print designers work in images, shapes, and color: not code. The last thing many of them want to do is to translate their work into mono-spaced tags and numbers, divs and ids. But print designers can't ignore the web and producing a design for the web has become a common part of a complete graphics package. And,...

Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Making, Breaking Codes: Introduction to Cryptology
Making, Breaking Codes: Introduction to Cryptology

This book is an introduction to modern ideas in cryptology and how to employ these ideas. It includes the relevant material on number theory, probability, and abstract algebra, in addition to descriptions of ideas about algorithms and com plexity theory. Three somewhat different terms appear in the discussion of secure communications...

Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification
Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification

The world of enterprise routing with Juniper Networks devices is getting very exciting—new technologies, products, and network developments are making the enterprise network environment one of the most dynamic places to be. However, we, the authors, hope to focus that energy by providing you with a detailed and practical...

Result Page: 61 60 59 58 57 56 55 54 53 52 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy