Home | Amazing | Today | Tags | Publishers | Years | Search 
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

iPad Application Development For Dummies
iPad Application Development For Dummies

The world stood on its toes as Steve Jobs announced the iPad in January 2010 as “our most advanced technology in a magical and revolutionary device at an unbelievable price.”

Do you believe in magic? The iPad has that magical quality of disappearing into your hands as you explore content with it. You have to hold...

How to Do Everything BlackBerry Storm2
How to Do Everything BlackBerry Storm2

Congratulations on the purchase of your new BlackBerry Storm2. You’re going to be amazed at how versatile this little device is, how many ways you can use it to stay in touch with others, and how many “apps” are available for you to play and work with. You’ll love GPS, texting, adding participants to a phone...

Access Solutions: Tips, Tricks, and Secrets from Microsoft Access MVPs
Access Solutions: Tips, Tricks, and Secrets from Microsoft Access MVPs

Doug and I have known each other online for many years. We both became Microsoft MVPs about 10 years ago, and have been friends ever since. Both of us had been writing for magazines for years. Although we’d been talking about writing a book together for about five years now, there had always been an impediment, usually work, and...

Applications of Soft Computing: From Theory to Praxis (Advances in Intelligent and Soft Computing)
Applications of Soft Computing: From Theory to Praxis (Advances in Intelligent and Soft Computing)

The World Soft Computing (WSC) conference is an annual international online conference on applied and theoretical soft computing technology. This WSC 2008 is the thirteenth conference in this series and it has been a great success.

We received a lot of excellent paper submissions which were peer-reviewed by an international...

Hacking exposed web applications, 3rd Edition
Hacking exposed web applications, 3rd Edition

There is no escaping the reality that businesses live on the Web today. From banks to bookstores, from auctions to games, the Web is the place where most businesses ply their trade. For consumers, the Web has become the place where they do the majority of their business as well. For example, nearly 50 percent of all retail music sales in the...

Moving Media Storage Technologies: Applications & Workflows for Video and Media Server Platforms
Moving Media Storage Technologies: Applications & Workflows for Video and Media Server Platforms

Storage technologies have fundamentally changed the landscape of digital media in a profound way. Gone are the days of using a single hard disk drive on a workstation as the sole means to store digital content. Nearly vanished is the practice of capturing video and audio only on videotape. The practice of transferring videotape...

Learn HTML and CSS with w3Schools
Learn HTML and CSS with w3Schools

Welcome to Learn HTML and CSS with w3schools. This book is for Web users learning to create their own Web pages using HTML, the standard tagging language for the World Wide Web.

w3schools (www.w3schools.com) is one of the top Web destinations to learn HMTL and many other key Web languages. w3schools’ tutorials are...

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies...

The New C Standard: A Cultural and Economic Commentary
The New C Standard: A Cultural and Economic Commentary

This book contains a detailed analysis of the International Standard for the C language,-3.1 excluding the library from a number of perspectives. The organization of the material is unusual in that it is based on the actual text of the published C Standard. The unit of discussion is the individual sentences from the C Standard (2022 of...

The Investigator's Guide to Computer Crime
The Investigator's Guide to Computer Crime

In the past half-century we have gone from a world where computers were science fiction to a world where computers are everyday fact. Just thirty years ago the computer that flew with the first astronauts to the moon had less computing power than the computer on the average student’s desk today. Computers have grown in popularity,...

Microsoft Forefront UAG 2010 Administrator's Handbook
Microsoft Forefront UAG 2010 Administrator's Handbook

The Israeli department of defence has one of the strictest information security guidelines in the world, and a part of these guidelines is the requirement to have complete physical separation between the public and internal networks. A regular firewall just won't do, and this requirement gave birth to the concept of the Air-Gap, a...

Result Page: 1169 1168 1167 1166 1165 1164 1163 1162 1161 1160 1159 1158 1157 1156 1155 1154 1153 1152 1151 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy