Home | Amazing | Today | Tags | Publishers | Years | Search 
Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011
Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011

It was a real pleasure to have taken part in organizing the 10th International Conference on Cryptography and Network Security (CANS 2011). It was held during December 10–12, 2011, at the International Asia Pacific Convention Center in Sanya, on the subtropical island of Hainan (China). CANS 2011 was sponsored by the National...

Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010
Automated Technology for Verification and Analysis: 8th International Symposium, ATVA 2010

These proceedings contain the papers presented at the 8th Internationl Symposium on Automated Technology for Verification and Analysis held during September 21–24, 2010 in Singapore. The primary objective of the ATVA conferences remains the same: to exchange and promote the latest advances of state-of-the-art research on...

Transactions on Data Hiding and Multimedia Security VI
Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed introduction of these four papers, please refer to the Preface written by the organizers...
Practical Database Programming with Java
Practical Database Programming with Java
D atabases have become an integral part of our modern day life. We are an information - driven society. Database technology has a direct impact on our daily lives. Decisions are routinely made by organizations based on the information collected and stored in databases. A record company may decide to market certain albums in...
Algorithms and Architectures for Parallel Processing: 10th International Conference, ICA3PP 2010, Busan
Algorithms and Architectures for Parallel Processing: 10th International Conference, ICA3PP 2010, Busan
It is our great pleasure to welcome you to the proceedings of the 10th annual event of the International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP).

ICA3PP is recognized as the main regular event covering the many dimensions of parallel algorithms and architectures, encompassing
...
Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
Advances in Databases and Information Systems: 8th East European Conference, ADBIS 2004, Budapest
This volume continues the series of proceedings of the annual ADBIS conferences in the field of advances in databases and information systems.

ADBIS, founded by the Moscow ACM SIGMOD Chapter, was extended into a regular East-European conference in 1996 to establish a forum for promoting interaction and
...
The Linux Command Line: A Complete Introduction
The Linux Command Line: A Complete Introduction

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line.

The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way...

Programming Perl: Unmatched power for text processing and scripting
Programming Perl: Unmatched power for text processing and scripting

Adopted as the undisputed Perl bible soon after the first edition appeared in 1991, Programming Perl is still the go-to guide for this highly practical language. Perl began life as a super-fueled text processing utility, but quickly evolved into a general purpose programming language that’s helped hundreds of thousands...

MariaDB Crash Course
MariaDB Crash Course

MariaDB is a database server that offers drop-in replacement functionality for MySQL. Built by some of the original authors of MySQL, with assistance from the broader community of free and open source software developers, MariaDB offers a rich set of feature enhancements to MySQL, including alternate storage engines,...

Compilers: Principles, Techniques, & Tools with Gradiance (pkg) (2nd Edition)
Compilers: Principles, Techniques, & Tools with Gradiance (pkg) (2nd Edition)
In the time since the 1986 edition of this book, the world of compiler design has changed significantly. Programming languages have evolved to present new compilation problems. Computer architectures offer a variety of resources of which the compiler designer must take advantage. Perhaps most interestingly, the venerable...
SCJP Sun Certified Programmer for Java 6 Exam 310-065
SCJP Sun Certified Programmer for Java 6 Exam 310-065

This book's primary objective is to help you prepare for and pass Sun Microsystem's SCJP certification for Java 6 or Java 5. The Java 6 and Java 5 exams are almost identical in scope, and they are both much broader than their predecessor, the Java 1.4 exam. For the remainder of this book we'll typically reference the Java 6 exam,...

Moodle 2 for Teaching 7-14 Year Olds Beginner's Guide
Moodle 2 for Teaching 7-14 Year Olds Beginner's Guide
Moodle 2 For Teaching 7-14 Year Olds is not a book for geeks. This book will not tell you about PHP, HTML, or anything else that you don't need to know. This is a practical book for teachers, written by a teacher with two decades of practical experience, latterly in using Moodle to motivate younger students. The aim of this...
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy