Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Tablet PC Applications (Programming Series)
Developing Tablet PC Applications (Programming Series)

The new Tablet PC combines the latest incarnation of previous notebook computing technologies (i.e., digital ink and voice commands) with the power and reliability of Windows XP, possibly making it the most versatile PC ever. Developing Tablet PC Applications teaches programmers how to create applications for this exciting new...

A Classical Introduction to Cryptography: Applications for Communications Security
A Classical Introduction to Cryptography: Applications for Communications Security
From the reviews:

"This impressive hardback introduces fundamentals of information and communications security by providing mathematical concepts to prove or break the security of cryptographic schemes. … The book is designed for upper-level undergraduates and graduate level students in computer science. This comprehensive volume is...

Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
Image Processing: Principles and Applications
Image Processing: Principles and Applications
Image processing—from basics to advanced applications

Learn how to master image processing and compression with this outstanding state-of-the-art reference. From fundamentals to sophisticated applications, Image Processing: Principles and Applications covers multiple topics and provides a fresh perspective on future directions and...

Smart Antenna Systems and Wireless Lans (The International Series in Engineering and Computer Science)
Smart Antenna Systems and Wireless Lans (The International Series in Engineering and Computer Science)
This book covers the design and mechanics of smart antenna systems and their compatibility with the worldwide wireless LAN standard (IEEE 802.11). Included are applications for Wireless LANs, terrestrial and satellite cellular systems, wireless data distribution systems, and other advanced systems. In-depth coverage is provided on utilizing...
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking...
Fundamentals of Speaker Recognition
Fundamentals of Speaker Recognition
When I was being interviewed at the handwriting recognition group of IBM T.J. Watson Research Center in December of 1990, one of the interviewers asked me why, being a mechanical engineer, I was applying for a position in that group. Well, he was an electrical engineer and somehow was under the impression that handwriting...
Geopositioning and Mobility (ISTE)
Geopositioning and Mobility (ISTE)

This book presents a general overview of the applications and use of geopositioning and GNSS for assisting the supervision and management of mobile terrestrial professions, information, traffic regulation, multimodal information, pedestrian mobility and indoor geopositioning, etc. It especially focuses on the field of mobility and terrestrial...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

Economics
Economics

The same unique voice that made Paul Krugman a widely read economist is evident on every page of Economics. The product of the partnership of coauthors Krugman and Robin Wells, the book returns in a new edition.

The new edition is informed and informative, solidly grounded in economic fundamentals yet focused
...
Microsoft Exchange Server 2010 Best Practices
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.

The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following
...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy