Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
The Definitive Guide to Django: Web Development Done Right, Second Edition
The Definitive Guide to Django: Web Development Done Right, Second Edition
This latest edition of The Definitive Guide to Django is updated for Django 1.1, and, with the forward–compatibility guarantee that Django now provides, should serve as the ultimate tutorial and reference for this popular framework for years to come.

Django, the Python–based equivalent to Ruby’s Rails web development...

The Integrity of the Judge (Law, Justice and Power)
The Integrity of the Judge (Law, Justice and Power)

There is no consensus among legal scholars on the meaning of judicial integrity, nor has legal scholarship yet seen a well-articulated discussion about the normative concept of judicial integrity. This book fills this gap by developing a theory of judicial integrity that can be applied to safeguarding mechanisms. Author Jonathan Soeharno makes...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Microsoft Exchange Server 2013 High Availability
Microsoft Exchange Server 2013 High Availability

Design a highly available Exchange 2013 messaging environment using real-world examples

Overview

  • Use the easy-to-follow guidelines and tips to achieve the highest availability
  • Covers all the aspects that need to be considered before, during and after implementation of high availability
  • ...
Learn Android Studio: Build Android Apps Quickly and Effectively
Learn Android Studio: Build Android Apps Quickly and Effectively

Learn Android Studio covers Android Studio and its rich tools ecosystem, including Git and Gradle: this book covers how Android Studio works seamlessly with Git, for source control, and Gradle, a build and test tool. In addition, this book demonstrates how to develop/collaborate with remote Git web-hosting services such as GitHub and...

Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)
Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)

My objective in writing this book was to produce a general, comprehensive textbook that treats all the essential core areas of cryptography. Although many books and monographs on cryptography have been written in recent years, the majority of them tend to address specialized areas of cryptography. On the other hand, many of the existing general...

Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information...

Digital Image Forensics: There is More to a Picture than Meets the Eye
Digital Image Forensics: There is More to a Picture than Meets the Eye

Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical...

Guide to Neural Computing Applications (Hodder Arnold Publication)
Guide to Neural Computing Applications (Hodder Arnold Publication)
An excellent tutorial and practical users guide - far more accessible than the competition.,Professor Alan F. Murray, University of Edinburgh, UK. ... deserves a place on the neural network practitioners bookshelf ...,Proceedings of the Institution of Electrical Engineers,

Neural networks have shown enormous potential for
...
The Ethics of Research Biobanking
The Ethics of Research Biobanking
Biobanking, i.e. storage of biological samples or data emerging from such samples for diagnostic, therapeutic or research purposes, has been going on for decades. However, it is only since the mid 1990s that these activities have become the subject of considerable public attention, concern and debate. This shift in climate is due to several...
Anti-Social Behaviour
Anti-Social Behaviour
    From the Daily Mail's claim of Britain being named ‘Yob Capital of Europe’, to the headline in The Times of ‘Tearaway given ASBO at 10’, the subject of anti-social behaviour has been given a huge amount of political, social, media, public policy and academic interest in recent years.

    ...

unlimited object storage image
Result Page: 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy