 |
|
 GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)
We are entering the golden age of GPU computing. Since the introduction of CUDA in 2007, more
than 100 million computers with CUDA-capable GPUs have been shipped to end users. Unlike the
previous GPGPU shader programming models, CUDA supports parallel programming in C. From my
own experience in teaching CUDA programming, C programmers... |  |  Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a... |  |  Handbook of Financial Cryptography and Security
Cryptography has made a peculiar journey to become a modern science. It had long been
associated with the military and with magic. The rst published work in the eld was
Steganographia, by an alchemist named Trithemius. Although written earlier, the book was
published in 1606. Cryptography has continued this connection with the arcane... |
|
 Code: The Hidden Language of Computer Hardware and Software
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with each other. And through CODE, we see how this ingenuity and our very human compulsion to communicate have driven the technological... |  |  Microcontroller Systengineer
This book is about a state of the art tool, Flowcode[registered], and how you can use Flowcode to develop microcontroller applications. The book starts very simply with a tutorial project and step-by-step instructions. As you go along the projects increase in difficulty and the new concepts are explained. Each project has a clear description... |  |  Search Engine Optimization (SEO) Secrets
This book is for the SEO who already knows the basics of SEO and wants
to take this knowledge to the next level so that they can make more money.
In the SEO industry, the best way I have found to do this is to do SEO
consulting.
Tips, tricks, and little-known methods used by professional SEO consultants to rank in some of... |
|
 |  |  Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)
Excuse me, but who are you, exactly?
You are a father or mother, a son or daughter, husband or wife, a significant other, a rock
climber, a kite-flyer, a bicycle enthusiast, a marathon runner, a collector of old movies, a
secret novelist, a boxing fan. You are the center of your universe. On the picture collage from
the... |  |  The Templar Code For Dummies
A captivating look into the society of the Knights Templar
Brought to you by the author of Freemasons For Dummies, The Templar Code is more than an intriguing cipher or a mysterious symbol – it is the Code by which the Knights Templar lived and died, the Code that bound them together in secrecy, and the Code... |
|
|
| Result Page: 32 31 30 29 28 27 26 25 24 23 22 |