Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft SharePoint 2010 Unleashed
Microsoft SharePoint 2010 Unleashed

Using Microsoft SharePoint 2010 technologies, organizations can bring together, utilize, and collaborate with information from virtually any source. Microsoft SharePoint 2010 Unleashed is the most complete, practical resource for all administrators, managers, architects, users, and power users who want to make the...

Frommer's Washington State (Frommer's Complete)
Frommer's Washington State (Frommer's Complete)

Despite what you might have heard to the contrary, there is more to Washington state than lattes, rain, and Microsoft. Washington is actually such a diverse state that it could have served as a model for the song “America the Beautiful.” In the eastern high desert country, beautiful spacious skies are as big as Montana’s...

Twilight of the Machines
Twilight of the Machines

“John Zerzan can now credibly claim the honor of being America’s most famous anarchist. His writing is sharp, uncompromising, and tenacious.”—Derrick Jensen, Utne Reader

The mentor of the green anarchist and neo-primitive movements is back with his first book in six years, confronting...

Service-Oriented Computing: ICSOC 2010 International Workshops PAASC
Service-Oriented Computing: ICSOC 2010 International Workshops PAASC

Welcome to the workshop program of the 8th International Conference on Service Oriented Computing (ICSOC 2010), held in San Francisco, December 2010. These workshop proceedings represent high-quality research and industry papers that showcase recent and new working developments in service-oriented computing and related fields.

...

Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

Implementation and Application of Automata: 15th International Conference, CIAA 2010
Implementation and Application of Automata: 15th International Conference, CIAA 2010

This volume of Lecture Notes in Computer Science contains revised versions of papers presented at the 15th International Conference on Implementation and Application of Automata, CIAA 2010. The conference was held at the University of Manitoba in Winnipeg, Canada, on August 12–15, 2010. The previous CIAA conferences were held in London,...

An Introduction to Parallel Programming
An Introduction to Parallel Programming

Parallel hardware has been ubiquitous for some time now. It’s difficult to find a laptop, desktop, or server that doesn’t use a multicore processor. Beowulf clusters are nearly as common today as high-powered workstations were during the 1990s, and cloud computing could make distributed-memory systems as accessible as...

Large-Scale Parallel Data Mining (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Large-Scale Parallel Data Mining (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

With the unprecedented rate at which data is being collected today in almost all elds of human endeavor, there is an emerging economic and scienti c need to extract useful information from it. For example, many companies already have data-warehouses in the terabyte range (e.g., FedEx, Walmart). The World Wide Web has an estimated 800...

Programming Windows Azure: Programming the Microsoft Cloud
Programming Windows Azure: Programming the Microsoft Cloud

I hate the term the cloud. I really do. In a surprisingly short period of time, I’ve seen the term twisted out of shape and become a marketing buzzword and applied to every bit of technology one can conjure up. I have no doubt that in a few years, the term the cloud will be relegated to the same giant dustbin for bad technology...

Handbook of FPGA Design Security
Handbook of FPGA Design Security

The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, including corporations, industrial and government research labs, and academics. This book combines theoretical underpinnings with a practical...

Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)
Modern Cryptology: A Tutorial (Lecture Notes in Computer Science)

The present work grew out of lecture notes I prepared for a Vh hour tutorial that I was invited to give at the 29th IEEE Computer Conference (CompCon) in San Francisco on February 27, 1987. I have just completed a substantial update of the material, including the addition of several topics. My main purpose is to provide a...

Digital Asset Management
Digital Asset Management

My interest in this subject started when I joined the broadcast equipment manufacturer, Chyron. For a few years I was the product manager for their playout automation and asset management product lines. These were one of the first applications that gave television broadcasters the means to manage the ingest, storage, archiving, and...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy