Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MWSS : Object-Oriented Design in Java (Mitchell Waite Signature Series)
MWSS : Object-Oriented Design in Java (Mitchell Waite Signature Series)
Mitchell Waite Signature Series: Object-Oriented Design in Java takes a tutorial approach and teaches in a new way: by offering the Java code first and the design representations and explanations later. No other programming-level book on the market deals with design of Java software. There's nothing aimed at the in the trenches Java programmer....
Calvinize: Signature Techniques of Photoshop Artist Calvin Hollywood
Calvinize: Signature Techniques of Photoshop Artist Calvin Hollywood

Calvin Hollywood is a photo artist from Heidelberg, Germany who combines photography and image editing in a most imaginative way. His personal style is characterized by the hyper sharpness, high contrasts, and almost painted look of his photos (http://www.calvinhollywood-blog.com/portfolio/). Digital editing plays an important role in his...

In a Roman Kitchen: Timeless Recipes from the Eternal City
In a Roman Kitchen: Timeless Recipes from the Eternal City

From the savory splendor of crisply fried artichokes to the easy indulgence of spaghetti alla carbonara perfectly al dente, the cooking of Rome is every bit as glorious as the city’s breathtaking art and architecture. In a Roman Kitchen explores the delights of this rich culinary heritage with a spectacular tour of the markets,...

XML, Web Services, and the Data Revolution (Technology Series)
XML, Web Services, and the Data Revolution (Technology Series)

"Frank Coyle's XML,Web Services, and the Data Revolution does a great job of explaining the XML phenomenon by clearly describing where it came from, why it has proved so useful, and where it is likely to take us."—Michael Champion

XML, Web Services, and the Data Revolution presents a...

Introduction to Cryptography: Principles and Applications
Introduction to Cryptography: Principles and Applications
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on an...

Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Determining the identity of a person is becoming critical in our vastly interconnected
information society. As increasing number of biometrics-based identification systems
are being deployed for many civilian and forensic applications, biometrics and its
applications have evoked considerable interest. The current state of affairs is
...
Network Science and Cybersecurity (Advances in Information Security)
Network Science and Cybersecurity (Advances in Information Security)

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of  Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable...

Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
Pattern Recognition Technologies and Applications: Recent Advances (Premier Reference Source)
The nature of handwriting in our society has significantly altered over the ages due to the introduction of new technologies such as computers and the World Wide Web. With increases in the amount of signature verification needs, state of the art internet and paper-based automated recognition methods are necessary.

Pattern Recognition...

Cocoa Touch for iPhone OS 3 (Developer Reference)
Cocoa Touch for iPhone OS 3 (Developer Reference)

Join the gold rush to developing cool iPhone apps with this complete iPhone OS 3 developer’s guide. Professional developer Jiva DeVoe speaks your language, and he talks you through the entire process—from explaining Cocoa Touch and the iPhone SDK to using Xcode and the Game Kit API. Follow step-by-step tutorials, then apply practical...

TCP/IP: architecture, protocols, and implementation with IPv6 and IP security
TCP/IP: architecture, protocols, and implementation with IPv6 and IP security
TCP/IP by Sidnie Feit has sold over 20,000 copies in its previous two editions. We want to capitalize on their success with an updated paperback edition called "The Signature Edition." The Signature Series is reserved for our top selling communications authors that have established themselves as the authorities in computer communications....
Computer Security and Cryptography
Computer Security and Cryptography

Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect...

Developing Web Services with Apache Axis2
Developing Web Services with Apache Axis2

If you'd like to learn how to create web services (in particular, using Apache Axis2) and make some sense of various standards like SOAP, WSDL, MTOM, WS-Addressing, WS-Security, WS-Policy, XML Encryption and XML Signature, then this book is for you. Why? First, it has a tutorial style that walks you through in a step-by-step manner....

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy