Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Organization, Design, and Architecture, Fourth Edition
Computer Organization, Design, and Architecture, Fourth Edition

This book covers the organization, design, and architecture of computers. Architecture is the ‘‘art or science of building; a method or style of building,’’ according to Webster’s. A computer architect develops the functional and performance specifications for the various blocks of a computer system and...

Switching and Finite Automata Theory
Switching and Finite Automata Theory

Topics in switching and finite automata theory have been an important part of the curriculum in electrical engineering and computer science departments for several decades. The third edition of this book builds on the comprehensive foundation provided by the second edition and adds: significant new material in the areas of CMOS logic;...

Microsoft Expression Blend 4 Step by Step
Microsoft Expression Blend 4 Step by Step

Microsoft Expression Blend 4 is Microsoft’s newest interactive design tool. It’s intended for designers and developers who need to create user interfaces for rich Internet, desktop, and mobile applications—and it offers tools that support the design of such applications, from conception to completion.

...

Using FileMaker Bento
Using FileMaker Bento

Bento is a product from FileMaker, which is owned by Apple. Designed to bring FileMaker’s database expertise to users of Mac OS X Leopard and later, it integrates data from iPhoto, iCal, Mail, and Address Book with databases that you can create from your own data as well as data imported from other sources.

Bento is...

Building Enterprise Applications with Windows Presentation Foundation and the Model View ViewModel Pattern
Building Enterprise Applications with Windows Presentation Foundation and the Model View ViewModel Pattern

The Windows Presentation Framework (WPF), Silverlight, and Windows Phone 7 are the latest technologies for building flexible user interfaces (UI) for applications built with Microsoft technology. All three rely on the XAML markup language to describe UI elements and layout, and you can program applications for all three platforms with...

Cryptanalysis of RSA and Its Variants
Cryptanalysis of RSA and Its Variants

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its...

Object-Oriented Analysis and Design (Undergraduate Topics in Computer Science)
Object-Oriented Analysis and Design (Undergraduate Topics in Computer Science)

At least some people reading the title of this book may wonder why there should be one more book on the topic of Object Oriented Analysis and Design (OOAD). The short answer to this question is that in our teaching of the subject for over a decade, we have not been able to find a suitable textbook on this topic at our respective...

Link Mining: Models, Algorithms, and Applications
Link Mining: Models, Algorithms, and Applications

This book presents in-depth surveys and systematic discussions on models, algorithms and applications for link mining. Link mining is an important field of data mining. Traditional data mining focuses on "flat" data in which each data object is represented as a fixed-length attribute vector. However, many real-world data sets are...

Approximation and Online Algorithms: 8th International Workshop, WAOA 2010
Approximation and Online Algorithms: 8th International Workshop, WAOA 2010

Networked systems for transport, communication, and social interaction have contributed to all aspects of life by increasing economic and social efficiency. However, increased connectivity also gives intruders and attackers better opportunities to maliciously spread in the network, whether the spread is of disinformation, or of contamination...

Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop...

Moodle JavaScript Cookbook
Moodle JavaScript Cookbook

Moodle is the best e-learning solution on the block and is revolutionizing courses on the Web. Using JavaScript in Moodle is very useful for administrators and dynamic developers, as it uses built-in libraries to provide the modern and dynamic experience that is expected by web users today.

The Moodle JavaScript Cookbook will take...

Result Page: 146 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy