Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Legendary Artists and the Clothes They Wore
Legendary Artists and the Clothes They Wore

Whether it’s Cecil Beaton’s flamboyant, classically tailored suits, Frida Kahlo’s love of bright color, or Cindy Sherman’s penchant for minimalism, an artist’s attire often reflects the creative and spiritual essence of his or her work. In Legendary Artists and the Clothes They Wore, fashion...

La Passione: How Italy Seduced the World
La Passione: How Italy Seduced the World
A jubilant celebration of Italy’s outsize impact on culture, from literature to art, music to movies, that “masterfully examines the multitude of reasons why so many people fall in love with Italy and the Italian lifestyle” (Forbes)

Can you imagine painting without Leonardo, opera
...
Practical Signcryption (Information Security and Cryptography)
Practical Signcryption (Information Security and Cryptography)

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...

Hack Proofing Your Identity
Hack Proofing Your Identity
The use of a seal, card, or other identification while making a purchase or signing
a contract is a custom almost as old as history. As merchants and their customers
have begun using the Internet in recent years to conduct business online, they
have been challenged to find digital forms of identification that mimic traditional,...
How to Make Money in Stocks: A Winning System in Good Times or Bad
How to Make Money in Stocks: A Winning System in Good Times or Bad
William J. O'Neil's proven investment advice has earned him millions of loyal followers. And his signature bestseller, How to Make Money in Stocks, contains all the guidance readers need on the entire investment process­­from picking a broker to diversifying a portfolio to making a million in mutual funds. For self-directed investors of...
Intellectual Property Protection in VLSI Design: Theory and Practice
Intellectual Property Protection in VLSI Design: Theory and Practice
The development and implementation of intellectual property (IP) protection mechanisms is of crucial importance for the emerging reuse-based system design methodology. Maybe even more importantly, it is such an elegant scientific and engineering challenge that it has drawn a lot of attention from academia and industry in recent years....
Object Technology: A Manager's Guide (2nd Edition)
Object Technology: A Manager's Guide (2nd Edition)
The first edition of Object Technology: A Manager's Guide is widely viewed as the classic introduction to this powerful computing concept. Object technology offers increased agility, significant time-to-market reduction, and the opportunity to exploit the potential of the World Wide Web by deploying globally distributed...
Refactoring to Patterns (The Addison-Wesley Signature Series)
Refactoring to Patterns (The Addison-Wesley Signature Series)

In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns, Joshua...

Local Area High Speed Networks (MTP)
Local Area High Speed Networks (MTP)
There is a great deal of change happening in the technology being used for local networks. As Web intranets have driven bandwidth needs through the ceiling, inexpensive Ethernet NICs and switches have come into the market. As a result, many network professionals are interested in evaluating these new technologies for implementation consideration....
Information Science
Information Science
From cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains...
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy