Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Spatial Data on the Web: Modeling and Management
Spatial Data on the Web: Modeling and Management
Spatial data is essential in a wide range of application domains today. While geographical applications remain the key target area, spatial properties are required in other contexts such as computer-aided design, robotics and image processing. Associated with these is the constantly growing number of distributed processing architectures, based on,...
Algorithms Unlocked
Algorithms Unlocked

Have you ever wondered how your GPS can find the fastest way to your destination, selecting one route from seemingly countless possibilities in mere seconds? How your credit card account number is protected when you make a purchase over the Internet? The answer is algorithms. And how do these mathematical formulations translate themselves...

Land the Tech Job You Love (Pragmatic Life)
Land the Tech Job You Love (Pragmatic Life)
As a techie, you're a special breed, with special challenges facing you in the job search. Your competition is smart, tech-savvy, and highly resourceful. Expectations among employers are higher. Your competition will run you over if you're not up to the challenge. Land the Tech Job You Love gives you the background, the skills, and the...
Living Well in a Down Economy For Dummies
Living Well in a Down Economy For Dummies

Get smart about spending and saving -- and ride out a recession!

Looking for practical ways to make every dollar count? This savvy guide gives you expert tips for tightening your belt and saving cash in every area of your life -- from your house and car to dining and entertaining to banking and managing debt. You get...

Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised ... (Lecture Notes in Computer Science, 10958)
Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised ... (Lecture Notes in Computer Science, 10958)
This book constitutes the refereed proceedings of 3 workshops held at the 22nd International Conference on Financial Cryptography and Data Security, FC 2018, in Nieuwport, Curaçao, in March 2018.

The 23 full papers presented together with 2 short papers were carefully reviewed and selected
...
Demystifying Embedded Systems Middleware
Demystifying Embedded Systems Middleware

This practical technical guide to embedded middleware implementation offers a coherent framework that guides readers through all the key concepts necessary to gain an understanding of this broad topic. Big picture theoretical discussion is integrated with down-to-earth advice on successful real-world use via step-by-step examples of each type...

Professional SharePoint 2010 Cloud-Based Solutions (Wrox Programmer to Programmer)
Professional SharePoint 2010 Cloud-Based Solutions (Wrox Programmer to Programmer)

THE “CLOUD” IS ONE OF THE MOST tossed-around words these days in any IT conversation. But what does it mean? And what are the implications of the cloud for SharePoint? In fact, there are many implications for SharePoint with the cloud, ranging from extending existing solutions to use code or services that are deployed to the...

Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

The Ultimate Book on Group Policy

Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft...

Mike and Phani's Essential C++ Techniques
Mike and Phani's Essential C++ Techniques

C++ is the language of choice for developing the most sophisticated Windows programs, but it is filled with hidden traps for the unwary. Mike Hyman and Phani Vaddadi's no-nonsense book helps C++ programmers avoid these traps by providing invaluable techniques gleaned from a combined 30 years of...

Analytics: The Agile Way (Wiley and SAS Business Series)
Analytics: The Agile Way (Wiley and SAS Business Series)
For decades now, companies big and small have embraced Agile software development methods. The rationale here is straightforward:
  • Why take one or two years to fully deploy a system, app, or website when so many things can and do go wrong?
  • Why try to cook one big batch and boil the ocean?
  • ...
Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Guide to Ambient Intelligence in the IoT Environment: Principles, Technologies and Applications (Computer Communications and Networks)
Ambient intelligence (AmI) is an element of pervasive computing that brings smartness to living and business environments to make them more sensitive, adaptive, autonomous and personalized to human needs. It refers to intelligent interfaces that recognise human presence and preferences, and adjust smart environments to suit their...
Statistics Hacks : Tips &Tools for Measuring the World and Beating the Odds
Statistics Hacks : Tips &Tools for Measuring the World and Beating the Odds

Want to calculate the probability that an event will happen? Be able to spot fake data? Prove beyond doubt whether one thing causes another? Or learn to be a better gambler? You can do that and much more with 75 practical and fun hacks packed into Statistics Hacks. These cool tips, tricks, and...

unlimited object storage image
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy