Home | Amazing | Today | Tags | Publishers | Years | Search 
Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings
Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings

It is a pleasure and an honour both to organize ICB 2009, the 3rd IAPR/IEEE International Conference on Biometrics. This will be held 2–5 June in Alghero, Italy, hosted by the Computer Vision Laboratory, University of Sassari. The conference series is the premier forum for presenting research in biometrics and its allied technologies:...

C# 2010 for Programmers (4th Edition) (Deitel Developer Series)
C# 2010 for Programmers (4th Edition) (Deitel Developer Series)

The professional programmer’s Deitel® guide to C# 2010 and the powerful Microsoft® .NET 4 Framework

Written for programmers with a background in C++, Java or other high-level, object-oriented languages, this book applies the Deitel signature live-code approach to teaching programming and...

JavaScript for Programmers
JavaScript for Programmers

The practicing programmer’s Deitel® guide to XHTML®, CSS®, JavaScript, XML® and Ajax RIA development.

 

This book applies the...

C# for Programmers (2nd Edition)
C# for Programmers (2nd Edition)

The practicing programmer's DEITEL® guide to C# and the powerful Microsoft .NET Framework

Written for programmers with a background in C++, Java, or other high-level languages, this book applies the Deitel signature live-code approach to teaching programming and explores Microsoft's C#...

Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Practical Signcryption (Information Security and Cryptography)
Practical Signcryption (Information Security and Cryptography)

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...

C+ + for Programmers (Deitel Developer Series)
C+ + for Programmers (Deitel Developer Series)
The professional programmer’s DEITEL® guide to C++ and object-oriented application development

Written for programmers with a background in high-level language programming, this book applies the Deitel signature live-code approach to teaching programming and explores the C++ language and C++ Standard
...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Discover Signal Processing: An Interactive Guide for Engineers
Discover Signal Processing: An Interactive Guide for Engineers

Signal processing is now a multidisciplinary topic, and one that has applications in many fields including, but not limited to, science, engineering, medicine, finance and the behavioural sciences. Modern software libraries that include dedicated languages and packages designed to simplify the development and application of signal processing...

Dictionary of e-Business: A Definitive Guide to Technology and Business Terms
Dictionary of e-Business: A Definitive Guide to Technology and Business Terms
In a fast-moving technical and business environment like the Internet only exactitude can guarantee success. An 'almost correct' specification is a wrong specification. Make total accuracy your signature with this invaluable guide.

It offers detailed definitions of the bewildering array of terms and phrases relating to e-Business and the...

Serial Violence: Analysis of Modus Operandi and Signature Characteristics of Killers
Serial Violence: Analysis of Modus Operandi and Signature Characteristics of Killers
Written by renowned experts Bob Keppel and William Birnes, this book focuses on analyzing crimes of violence to unveil common characteristics that might prove useful in the successful identification, apprehension, and conviction of murderers. It details the historical origins of modus operandi as an investigative tool and discusses modern...
A Classical Introduction to Cryptography: Applications for Communications Security
A Classical Introduction to Cryptography: Applications for Communications Security
From the reviews:

"This impressive hardback introduces fundamentals of information and communications security by providing mathematical concepts to prove or break the security of cryptographic schemes. … The book is designed for upper-level undergraduates and graduate level students in computer science. This comprehensive volume is...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy