Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Colossus: The Secrets of Bletchley Park's Code-breaking Computers (Popular Science)
Colossus: The Secrets of Bletchley Park's Code-breaking Computers (Popular Science)
"An excellent, ground breaking book, highly recommended."--Books-On-Line

The American ENIAC is customarily regarded as having been the starting point of electronic computation. This book rewrites the history of computer science, arguing that in reality Colossus--the giant computer built by the British secret service during
...
Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)
Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)

Excuse me, but who are you, exactly?

You are a father or mother, a son or daughter, husband or wife, a significant other, a rock climber, a kite-flyer, a bicycle enthusiast, a marathon runner, a collector of old movies, a secret novelist, a boxing fan. You are the center of your universe. On the picture collage from the...

Quantum Mechanics of Molecular Structures
Quantum Mechanics of Molecular Structures
The world we live in is filled with molecules. Starting with oxygen and nitrogen in the atmosphere, water, carbon dioxide, and ammonia are all molecules. Furthermore, plants and animals are all composed of molecules. In the field of chemistry, which is regarded as science for molecules, it has been one of the most important and...
Excel for Teachers (Excel for Professionals series)
Excel for Teachers (Excel for Professionals series)
This book is written by three teachers and a guy who teaches Excel. As the latter, I give all of the credit for this book to Adrienne, Bill H. and Colleen – it was their logic of classroom needs that made the book what it is. The population of teachers writing this book mirrors the real population – some know Excel well and some are new...
Information Flow Control for Java: A Comprehensive Approach Based on Path Conditions in Dependence Graphs
Information Flow Control for Java: A Comprehensive Approach Based on Path Conditions in Dependence Graphs

This thesis presents several precise techniques that analyze object-oriented languages for security violations, together with evaluations on Java benchmarks. The key question that will be targeted throughout this work is “Can a given statement directly or indirectly influence another statement, and if this is possible, how can this...

Fundamentals of Algorithmics
Fundamentals of Algorithmics

This is an introductory-level algorithm book. It includes worked-out examples and detailed proofs. Presents Algorithms by type rather than application. KEY TOPICS: Includes structured material by techniques employed, not by the application area, so readers can progress from the underlying abstract concepts to the concrete application...

Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

One of the most gripping yet improbable stories spawned by the computer revolution, Hacker Crocker is a classic American-dream success story set on the razor edge of high technology. Ejovi Nuwere takes the reader on the roller-coaster ride of his extraordinary life, from the bullet-riddled, drugged-out streets of one of America's...

The Rules of Work, Expanded Edition: A Definitive Code for Personal Success (Richard Templar's Rules)
The Rules of Work, Expanded Edition: A Definitive Code for Personal Success (Richard Templar's Rules)

Some people are simply great at their job; they always seem to say or do the right thing. They are mentioned in every conversation. Everybody likes them. They get promoted. They get pay raises. They get along with the boss. And somehow, they do all these things without being unpleasant, breaking much of a sweat or seeming...

PrestaShop 1.3 Beginner's Guide
PrestaShop 1.3 Beginner's Guide

PrestaShop is a hidden gem. There are many much more widely known online shopping cart solutions that have nothing like the features, potential, and ease of use that this open source, completely free-to-use, system has. But until now there has been no information available on how to make the most of it. This book takes a step-by-step approach...

SAP SRM Extended Classic Cookbook
SAP SRM Extended Classic Cookbook
The SAP SRM Extended Classic Cookbook Configuration and Management! If you thought the heavy integration and amount of technical knowledge required to master SAP's SRM/EBP product in Classic mode was staggering, you will find the Extended Classic scenario an even greater challenge. Now, for the first time, a world class SAP consultant reveals...
Nutrition and Wound Healing (Modern Nutrition Science)
Nutrition and Wound Healing (Modern Nutrition Science)

With mounting evidence regarding the role of poor nutrition in the development of chronic diseases such as heart disease and diabetes, it is no secret that appropriate nutrition is crucial to optimal health. Achieving the correct balance of elements provides the body with the ability to adapt to a shifting and often hazardous environment....

Cryptography for Internet & Database Applications
Cryptography for Internet & Database Applications
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy