Home | Amazing | Today | Tags | Publishers | Years | Search 
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....

Software Automatic Tuning: From Concepts to State-of-the-Art Results
Software Automatic Tuning: From Concepts to State-of-the-Art Results

Software automatic tuning is a technology paradigm enabling software adaptation to a variety of computational conditions. Originating from the stream of research works on highperformance computing, it is considered to be the most promising approach to the required performance advancements on the next generation supercomputing platforms. Also,...

Five-Star Apps: The best iPhone and iPad apps for work and play
Five-Star Apps: The best iPhone and iPad apps for work and play

What makes a five-star app? A program has to be interesting, even if the task it’s performing is routine. When you look at a dozen apps that have the same informational, utilitarian, or entertainment goal, five-star apps have that extra something special that floats to the top.

It can be a concierge, camera, flashlight, game...

PHP 5 Social Networking
PHP 5 Social Networking

Social Networking has quickly become a very popular activity on the Internet, particularly with the emergence of sites like Facebook and MySpace. PHP is a flexible web development language used on a wide variety of sites, including Facebook and Yahoo! But building a social networking site from scratch using PHP involves some complex logic,...

Assemble the Social Web with zembly
Assemble the Social Web with zembly

Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More!

With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and scale next-generation web applications as it is
...

Concurrent Programming on Windows
Concurrent Programming on Windows

“When you begin using multi-threading throughout an application, the importance of clean architecture and design is critical. . . . This places an emphasis on understanding not only the platform’s capabilities but also emerging best practices. Joe does a great job interspersing best practices alongside theory...

Droid Companion
Droid Companion

Congratulations on your new Droid smartphone! You’re going to be amazed when you discover all the ways it enables you to connect with your contacts and stay in touch with the world. You can communicate via talk, text, email, social networking, and chatting with instant messaging, and on some newer Droid phones, you may even be able to...

Exim: The Mail Transfer Agent
Exim: The Mail Transfer Agent
Back in 1995, the central computing services at Cambridge University were running a variety of mail transfer agents, including Sendmail, Smail 3, and PP. Some years before, I had converted the systems whose mail I managed from Sendmail to Smail to make it easier to handle the special requir ements of the early 1990s...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Adobe Business Catalyst: Design full-featured websites without the hassles of development
Adobe Business Catalyst: Design full-featured websites without the hassles of development
The Internet has completely transformed the way products are marketed and sold. Technology is evolving very quickly and businesses are constantly reinventing themselves. Customers want more for their money. They have learned to shop around to find the best value. They compare reviews to purchase the highest-rated items. As the...
Deformable Surface 3D Reconstruction from Monocular Images (Synthesis Lectures on Computer Vision)
Deformable Surface 3D Reconstruction from Monocular Images (Synthesis Lectures on Computer Vision)
Deformable surface 3D reconstruction from monocular images is an active area of research in the Computer Vision community. This encompasses recovering both the shape of thin objects that can be treated as surfaces without perceptible thickness and the visible envelope of fully 3D objects. Whereas this may seem easy for a human...
Sams Teach Yourself Google+ in 10 Minutes (Sams Teach Yourself -- Minutes)
Sams Teach Yourself Google+ in 10 Minutes (Sams Teach Yourself -- Minutes)

Sams Teach Yourself Google™+ in 10 Minutes gives you straightforward, practical answers when you need fast results. Work through its 10-minute lessons to jumpstart your Google+ experience...and then use today’s hottest social network to connect with everyone and everything you care about!  

...
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy