Home | Amazing | Today | Tags | Publishers | Years | Search 
Functional and Logic Programming: 10th International Symposium, FLOPS 2010
Functional and Logic Programming: 10th International Symposium, FLOPS 2010

This volume contains the proceedings of the 10th International Symposium on Functional and Logic Programming (FLOPS 2010), held in Sendai, Japan, April 19–21, 2010 at Aoba Memorial Hall, Tohoku University.

FLOPS is a forum for research on all issues concerning declarative programming, including functional programming and...

Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now involves some...

Microsoft Access 2010 In Depth
Microsoft Access 2010 In Depth

Access 2010 In Depth is the beyond-the-basics, beneath-the-surface guide for everyone who wants to streamline their work with Access 2010, and get more done in less time. Legendary Access expert Roger Jennings provides specific, tested, proven solutions to the problems Access database users and developers run into...

Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference

The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.

Identity management is put...

Future Generation Information Technology: Second International Conference, FGIT 2010
Future Generation Information Technology: Second International Conference, FGIT 2010

As information technology (IT) becomes specialized and fragmented, it is easy to lose sight that many topics have common threads and because of this, advances in one subdiscipline may transmit to another. The presentation of results between different subdisciplines encourages this interchange for the advancement of IT as a whole.

...

Towards a Service-Based Internet: Third European Conference, ServiceWave 2010
Towards a Service-Based Internet: Third European Conference, ServiceWave 2010

The ServiceWave conference series is committed to being the premier European forum for researchers, educators and industrial practitioners to present and discuss the most recent innovations, trends, experiences and concerns in software services (or the “Future of the Internet of Service”) and related underlying infrastructure...

Oxford American Handbook of Sports Medicine
Oxford American Handbook of Sports Medicine

Written by leading American practitioners, the Oxford American Handbooks of Medicine each offer a pocket-sized overview of an entire specialty, featuring instant access to guidance on the conditions that are most likely to be encountered. Precise and prescriptive, the handbooks offer up-to-date advice on examination, investigations, common...

The Definitive Guide to Interwoven TeamSite (Definitive Guides)
The Definitive Guide to Interwoven TeamSite (Definitive Guides)

Adigital flood is upon us. Content inundates us. It begins as bits of content swirling everywhere—a document, an image, a written corporate procedure, a web page, or an email. The binary mist mixes, combines, and rains down on us. It pools in laptops, on desktops, and in server farms. Creeks and streams meander to corporate reservoirs....

Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

Engineering of Software: The Continuing Contributions of Leon J. Osterweil
Engineering of Software: The Continuing Contributions of Leon J. Osterweil

Software engineering research can trace its roots to a small number of highly influential individuals. Among that select group is Prof. Leon J. Osterweil, whose work has fundamentally defined or impacted major directions in software analysis, developmenttools and environments, and software process. His exceptional and sustained contributions...

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

C# 4.0 Unleashed
C# 4.0 Unleashed

C# 4.0 Unleashed is a practical reference focusing on the C# language and the .NET platform as a whole. While covering the language in lots of detail, it also provides enough coverage of various popular .NET technologies and techniques (such as debugging) for the reader to be successful on the .NET platform. The...

Result Page: 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy