Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger

Implement decentralized blockchain applications to build scalable Dapps

Key Features

  • Understand the blockchain ecosystem and its terminologies
  • Implement smart contracts, wallets, and consensus protocols
  • Design and develop decentralized applications using...
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

Social Media Tools in Experiential Internship Learning
Social Media Tools in Experiential Internship Learning

This book describes how a support structure can be built to enhance peer-to-peer (and also students-to-lecturers) communication and support. It informs lecturers on how they can decide if they should adopt one or more social media tools to facilitate students’ learning, communication, and support for an internship program. This...

Complex Networks and Their Applications VII: Volume 1 Proceedings The 7th International Conference on Complex Networks and Their Applications COMPLEX ... 2018 (Studies in Computational Intelligence)
Complex Networks and Their Applications VII: Volume 1 Proceedings The 7th International Conference on Complex Networks and Their Applications COMPLEX ... 2018 (Studies in Computational Intelligence)
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of applications. It presents the peer-reviewed proceedings of the VII International Conference on Complex Networks and their Applications...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Brokers of Modernity: East Central Europe and the Rise of Modernist Architects, 1910–1950
Brokers of Modernity: East Central Europe and the Rise of Modernist Architects, 1910–1950

The first half of the twentieth century witnessed the rise of modernist architects. Brokers of Modernity reveals how East Central Europe turned into one of the re-eminent testing grounds of the new belief system of modernism. By combining the internationalism of the CIAM organization and the modernising aspirations of the new...

Algorithms of the Intelligent Web
Algorithms of the Intelligent Web
Web 2.0 applications provide a rich user experience, but the parts you can't see are just as important-and impressive. They use powerful techniques to process information intelligently and offer features based on patterns and relationships in data. Algorithms of the Intelligent Web shows readers how to use the same techniques employed by...
Professional NFC Application Development for Android
Professional NFC Application Development for Android

A practical guide to developing and deploying Near Field Communication (NFC) applications

There has been little practical guidance available on NFC programming, until now. If you're a programmer or developer, get this unique and detailed book and start creating apps for this exciting technology. NFC enables contactless...

Rural Technology Development and Delivery: RuTAG and Its Synergy with Other Initiatives (Design Science and Innovation)
Rural Technology Development and Delivery: RuTAG and Its Synergy with Other Initiatives (Design Science and Innovation)

This book comprises the proceedings of a rural technologies conference organised by the Rural Technology Action Group (RuTAG), which was conceptualized and initiated by Principal Scientific Adviser (PSA) to the Government of India R. Chidambaram in 2003–04. The book highlights case studies and research into providing science...

AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Result Page: 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy