Home | Amazing | Today | Tags | Publishers | Years | Search 
Multimedia Semantics: Metadata, Analysis and Interaction
Multimedia Semantics: Metadata, Analysis and Interaction
Digital multimedia items can be found on most electronic equipment ranging from mobile phones and portable audiovisual devices to desktop computers. Users are able to acquire, create, store, send, edit, browse, and render through such content at an increasingly fast rate. While it becomes easier to generate and store data, it also...
SharePoint 2010 Business Intelligence 24-Hour Trainer (Wrox Programmer to Programmer)
SharePoint 2010 Business Intelligence 24-Hour Trainer (Wrox Programmer to Programmer)

IF YOU’VE PICKED UP THIS BOOK, SharePoint 2010 Business Intelligence 24-Hour Trainer, you’ve decided to jump into one of the most dynamic areas of Business Intelligence: the exciting visualizations,

collaboration, and data service capabilities built into SharePoint 2010 through its new service application
...
Modern Fortran Explained (Numerical Mathematics and Scientific Computation)
Modern Fortran Explained (Numerical Mathematics and Scientific Computation)
Fortran remains one of the principal languages used in the fields of scientific, numerical, and engineering programming, and a series of revisions to the standard defining successive versions of the language has progressively enhanced its power and kept it competitive with several generations of rivals.

Beginning
...
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany
Public-Key Cryptography: State of the Art and Future Directions : E.I.S.S. Workshop, Oberwolfach, Germany

The "European Institute for System Security (E.I.S.S.)" was founded on February 29, 1988 by cabinet resolution of the state government Baden-Wurttemberg. It is headed by Professor Thomas Beth and is affiliated with the Institute for Algorithms and Cognitive Systems (IAKS) of the Faculty for Computer Science at the University of...

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Automated Deduction in Geometry: Second International Workshop, ADG'98, Beijing
Automated Deduction in Geometry: Second International Workshop, ADG'98, Beijing
The Second International Workshop on Automated Deduction in Geometry (ADG ’98) was held in Beijing, China, August 1–3, 1998. An increase of interest in ADG ’98 over the previous workshop ADG ’96 is represented by the notable number of more than 40 participants from ten countries and the strong technical...
LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks
LTE, LTE-Advanced and WiMAX: Towards IMT-Advanced Networks

A concise introduction to IMT-Advanced Systems, including LTE-Advanced and WiMAX

There exists a strong demand for fully extending emerging Internet services, including collaborative applications and social networking, to the mobile and wireless domain. Delivering such services can be possible only through realizing broadband...

Microsoft Windows Intune 2.0: Quickstart Administration
Microsoft Windows Intune 2.0: Quickstart Administration

Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7-so your computers and users can operate at peak performance all the time.

This step-by-step guide will show you how to plan, set up and maintain Windows Intune,...

Getting Started with Oracle Data Integrator 11g: A Hands-on Tutorial
Getting Started with Oracle Data Integrator 11g: A Hands-on Tutorial

The May 26, 2011 edition of the Economist magazine cites a report by the the McKinsey Global Institute (MGI) about data becoming a factor of production, such as physical or human capital. Across the industry, enterprises are investing significant resources in harnessing value from vast amounts of data to innovate, compete, and reduce...

Natural and Wood Fibre Reinforcement in Polymers (Rapra Review Reports)
Natural and Wood Fibre Reinforcement in Polymers (Rapra Review Reports)
The use of composite materials dates from centuries ago, when it all started with natural fibres. In ancient Egypt some 3,000 years ago, clay was reinforced by straw to build walls. Later on the natural fibre lost much of its interest.

This report examines the different fibre types available and the current research. The...

Grid Computing: International Symposium on Grid Computing (ISGC 2007)
Grid Computing: International Symposium on Grid Computing (ISGC 2007)
ISGC (International Symposium on Grid Computing) is one of the most important annual events in Asia that brings together scientists and engineers worldwide to exchange ideas, to present on challenges, solutions and future development in the field of Grid Computing. The objective of this Symposium is to facilitate the information...
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy