Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Research and Advanced Technology for Digital Libraries: 8th European Conference, ECDL 2004, Bath, UK, September 12-17, 2004, Proceedings
Research and Advanced Technology for Digital Libraries: 8th European Conference, ECDL 2004, Bath, UK, September 12-17, 2004, Proceedings
We are delighted lo present the ECDL 2004 Conference proceedings from the 8th European Conference on Research and Advanced Technology for Digital Li- braries at the University of Bath. Bath, UK. This followed an impressive and geographically dispersed series of locations for previous events: Pisa (1997). ller- aklion (1998),...
Legitimate Applications of Peer-to-Peer Networks
Legitimate Applications of Peer-to-Peer Networks
Peer-to-peer computing has gained a lot of prominence and publicity in the past years. Several start-up companies offer software packages that can be used for building peer-to-peer overlay networks for applications such as file sharing and music swapping. However, the legal and ethical questions associated with swapping copyrighted material on the...
Unity Multiplayer Games
Unity Multiplayer Games

Take your gaming development skills into the online multiplayer arena by harnessing the power of Unity 4 or 3. This is not a dry tutorial - it uses exciting examples and an enthusiastic approach to bring it all to life.

Overview

  • Create a variety of multiplayer games and apps in the Unity 4 game engine,...
How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
For Crying Out Loud: From Open Outcry to the Electronic Screen
For Crying Out Loud: From Open Outcry to the Electronic Screen

In Praise of For Crying Out Loud

"Endowed with strong parents and a bit of luck, Leo Melamed has made a remarkable escape from Nazi occupied Poland to building one of the pinnacles of global finance. Over four decades and more, he was the leading force in bringing his beloved 'Merc' from obscure trading pits for butter...

Agent-oriented Methodologies
Agent-oriented Methodologies
Building software to solve contemporary business problems is no easy task.
Over the last decade there has been an increasing focus on object-oriented
notations and modelling languages, perhaps at the expense of a full methodological
approach to solving the problem and giving software developers the
tools they need to
...
Professional Linux Programming
Professional Linux Programming
By tapping the strengths of the open-source movement, developers can write custom Linux software without spending a dime on licensing fees. Aimed at the experienced C/C++ programmer, Professional Linux Programming provides a wide-ranging and hands-on guide to the different pieces of the puzzle that are required to program successfully...
Cooperation in Wireless Networks: Principles and Applications: Real Egoistic Behavior Is to Cooperate!
Cooperation in Wireless Networks: Principles and Applications: Real Egoistic Behavior Is to Cooperate!

Cooperation in Wireless Networks: Principles and Applications covers the underlying principles of cooperative techniques as well as several applications demonstrating the use of such techniques in practical systems. The work is written in a collaborative manner by several authors from Asia, America, and Europe. Twenty chapters introduce and...

Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Information Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent...
Grant Writing For Dummies
Grant Writing For Dummies

Learn to:

  • Navigate federal grant databases and apply online for grants
  • Find the most current public and private sector grant opportunities
  • Create strong statements of need
  • Submit applications that meet funders’ expectations

Your comprehensive...

Java & XML
Java & XML

Java and XML, 3rd Edition, shows you how to cut through all the hype about XML and put it to work. It teaches you how to use the APIs, tools, and tricks of XML to build real-world applications. The result is a new approach to managing information that touches everything from configuration...

Collective Intelligence in Action
Collective Intelligence in Action
There's a great deal of wisdom in a crowd, but how do you listen to a thousand people talking at once? Identifying the wants, needs, and knowledge of internet users can be like listening to a mob.

In the Web 2.0 era, leveraging the collective power of user contributions, interactions, and feedback is the key to market dominance. A new...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy