Home | Amazing | Today | Tags | Publishers | Years | Search 
Shape Understanding System: The First Steps toward the Visual Thinking Machines (Studies in Computational Intelligence)
Shape Understanding System: The First Steps toward the Visual Thinking Machines (Studies in Computational Intelligence)
This book presents the results of the research in one of the most complex and difficult areas of research such as research in the areas of thinking and understanding. This research that is carried out in the newly founded Queen Jadwiga Research Institute of Understanding www.qjfpl.org/QJRIU/ Eng/Eng–QJRIU–PO–O.htm is focused on...
Mac OS X Panther in a Nutshell
Mac OS X Panther in a Nutshell
An instant success among newcomers, longtime Apple® fans and serious Unix® users alike, the Mac OS® X operating system combines stability, simplicity and elegance, and a stunning user interface. What more could Mac users want or need? The answer, of course, is Mac OS X Panther--a sleek and powerful overhaul of Mac OS X that promises to...
Building a Web 2.0 Portal with ASP.NET 3.5
Building a Web 2.0 Portal with ASP.NET 3.5
If you think you're well versed in ASP.NET, think again. This exceptional guide gives you a master class in site building with ASP.NET 3.5 and other cutting-edge Microsoft technologies. You learn how to develop rock-solid web portal applications that can withstand millions of hits every day while surviving scalability and security pressures -- not...
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista Annoyances: Tips, Secrets, and Hacks
Windows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended....
Public Key Cryptography  PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings
Public Key Cryptography PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings
These are the Proceedings of the 11th International Workshop on Practice and Theory in Public Key Cryptography – PKC 2008. The workshop was held in Barcelona, Spain, March 9–12, 2008.

It was sponsored by the International Association for Cryptologic Research (IACR; see www.iacr.org), this year in cooperation with MAK, the
...
Mathematical Methods for Physics and Engineering: A Comprehensive Guide
Mathematical Methods for Physics and Engineering: A Comprehensive Guide
From reviews of previous editions: '...a great scientific textbook. It is a tour de force ... to write mathematical sections that are both complete and at an appropriate academic level. The authors have clearly succeeded in this challenge, making this a remarkable pedagogical book ... The choice of exercises is excellent and possibly the best...
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and...
The Official Damn Small Linux(R) Book: The Tiny Adaptable Linux(R) That Runs on Anything (Negus Live Linux Series)
The Official Damn Small Linux(R) Book: The Tiny Adaptable Linux(R) That Runs on Anything (Negus Live Linux Series)
Damn Small Linux (DSL) started as an exercise by John Andrews to fit an entire desktop computer system into a compressed 50MB image. Within a few years, DSL grew to one of the most popular Linux systems in the world (in the Top Ten, by some accounts) without growing beyond that 50MB target.

In a world where desktop systems are...

Visual Basic .NET Bible
Visual Basic .NET Bible

If Visual Basic .NET can do it, you can do it too … Visual Basic .NET represents the greatest generational leap Visual Basic has ever taken. Written by a talented team of Visual Basic .NET experts, this comprehensive guide helps you flatten the .NET learning curve and get to work, whether you're a Visual Basic 6 veteran, an ASP developer,...

Teaching and Learning Vocabulary: Bringing Research to Practice
Teaching and Learning Vocabulary: Bringing Research to Practice

Teaching and Learning Vocabulary addresses the full range of students populating current classrooms - young children, English Language Learners, and young adolescents....this volume provides a rich, scientific foundation for effective vocabulary instruction and policy. In addition, few volumes can boast of a more luminous...

Google Guice: Agile Lightweight Dependency Injection Framework (Firstpress)
Google Guice: Agile Lightweight Dependency Injection Framework (Firstpress)
Guice (pronounced “Juice”) is the Jolt Award winning, 100% Java icing on the cake of Java dependency injection. Unlike other popular DI frameworks such as Spring, Guice fully embraces modern Java language features and combines simplicity with stunning performance and developer–friendliness.

Google Guice: Agile Lightweight...

Advanced Project Portfolio Management and the PMO: Multiplying ROI at Warp Speed
Advanced Project Portfolio Management and the PMO: Multiplying ROI at Warp Speed

This comprehensive book covers the strategy, tactics, and processes needed for successful project portfolio management. It outlines a road map to unprecedented project management improvement and includes a detailed implementation plan for both strategic planning and a PMO that gives you measurable results in weeks. The author delineates four...

Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy