Home | Amazing | Today | Tags | Publishers | Years | Search 
Financial Cryptography and Data Security: 12th International Conference, FC 2008
Financial Cryptography and Data Security: 12th International Conference, FC 2008

I am are very happy to have taken part in the 12th Financial Cryptography and Data Security Conference (FC 2008). Due to the recent growth in the number of security and cryptography venues, the competition for high-quality submissions has been on the rise. Despite that, the continued success of FC is attested by the research...

Smashing WordPress Themes: Making WordPress Beautiful (Smashing Magazine Book Series)
Smashing WordPress Themes: Making WordPress Beautiful (Smashing Magazine Book Series)

Smashing WordPress Themes is all about making your WordPress site look beautiful. But, the beautiful part is a very personal thing, because we all have different preferences. So in essence, my book isn’t on Web design, but rather about giving you, dear reader, the tools to build the kind of site that you want to create, using WordPress...

The Multiplayer Classroom: Designing Coursework as a Game
The Multiplayer Classroom: Designing Coursework as a Game

Discover how to engage your students and raise their grades and attendance in your classroom. THE MULTIPLAYER CLASSROOM: DESIGNING COURSEWORK AS A GAME is your detailed guide to designing any structured learning experience as a game. Written for professional educators or those learning to be educators, here are the tools to engage and excite...

Network Warrior
Network Warrior

The examples used in this book are taken from my own experiences, as well as from the experiences of those with or for whom I have had the pleasure of working. Of course, for obvious legal and honorable reasons, the exact details and any information that might reveal the identities of the other parties involved have been changed.

...
Ecological Modeling for Resource Management
Ecological Modeling for Resource Management

This book was developed from a workshop on the “Effective Use of Ecological Modeling in Management,” held in Oak Ridge, Tennessee, on October 23–26, 2000. The workshop was sponsored by the Department of Defense’s (DoD’s) Strategic Environmental Research and Development Program (SERDP), the Army Research...

Software Reliability Methods (Texts in Computer Science)
Software Reliability Methods (Texts in Computer Science)

This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software...

Bionanotechnology: Lessons from Nature
Bionanotechnology: Lessons from Nature

Today is the most exciting time to be working in nanotechnology, and bionanotechnology in particular. Chemistry, biology, and physics have revealed an immense amount of information on molecular structure and function, and now we are poised to make use of it for atomic-level engineering. New discoveries are being made every day, and...

Business Process Management Workshops: BPM 2010 International Workshops and Education Track
Business Process Management Workshops: BPM 2010 International Workshops and Education Track

Business process management (BPM) is an established research domain for computer science, information systems, and management scholars. The record number and wide scope of submissions to the eighth installation of the International Conference on Business Process Management was an indication of the vibrancy of the area and the varied...

Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development
Programming iOS 4: Fundamentals of iPhone, iPad, and iPod Touch Development

With the advent of version 2 of the iPhone system, Apple proved they could do a remarkable thing — adapt their existing Cocoa computer application programming framework to make applications for a touch-based device with limited memory and speed and a dauntingly tiny display. The resulting Cocoa Touch framework, in fact, turned...

Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

A company’s most important asset next to its people is its information. This information includes intellectual property, company financial information, confidential employee information, customer information, and so much more. Company information may be stored in databases, spreadsheets, flat files, and so on. Loss of...

PHP Master: Write Cutting Edge Code
PHP Master: Write Cutting Edge Code

PHP Master is aimed at intermediate PHP developers—those who have left their newbie status behind, and are looking to advance their skills and knowledge. Our aim as authors is to enable developers to refine their skills across a number of areas, and so we’ve picked topics that we felt have stood us in the best stead to grow...

Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne
Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne

CHES 2009, the 11th workshop on Cryptographic Hardware and Embedded Systems, was held in Lausanne, Switzerland, September 6–9, 2009. The workshop was sponsored by the International Association for Cryptologic Research (IACR).

The workshop attracted a record number of 148 submissions from 29 countries, of which the...

Result Page: 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy