Home | Amazing | Today | Tags | Publishers | Years | Search 
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara
Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized...

Software Development and Professional Practice
Software Development and Professional Practice

What’s this book all about? Well, it’s about how to develop software, from a personal perspective. We’ll look at what it means for you to take a problem and produce a program to solve it from beginning to end. That said, this book focuses a lot on design. How do you design software? What things do you take into...

Getting Started with Roo
Getting Started with Roo

This is my first book with O’Reilly, and I’m very grateful for their help and encouragement. Their editorial team is first class, and efficient. It was great working with you.

I, like many of you, have been using Spring for a long, long time. I wasn’t initially convinced I needed Spring Roo (to be honest). It...

Genealogy Online For Dummies (For Dummies)
Genealogy Online For Dummies (For Dummies)

Are you a student with an assignment to research your ancestry? Or maybe you’re a bit older and recently retired and looking for a hobby. Or perhaps you simply love puzzles and mysteries, and you discovered that genealogy is a lot like solving these. It’s even possible that you’re an experienced researcher who is...

Programming for TV, Radio & The Internet, Second Edition: Strategy, Development & Evaluation
Programming for TV, Radio & The Internet, Second Edition: Strategy, Development & Evaluation

Where do program ideas come from? How are concepts developed into saleable productions? Who do you talk to about getting a show produced? How do you schedule shows on the lineup? What do you do if a series is in trouble? The answers to these questions, and many more, can be found in this comprehensive, in-depth look at the roles and...

Multidisciplinary Information Retrieval: Second Information Retrieval Facility Conference, IRFC 2011
Multidisciplinary Information Retrieval: Second Information Retrieval Facility Conference, IRFC 2011

IRFC 2011 received 19 high-quality submissions, of which 10 were accepted for presentation at the conference and appear here. Three of these fall into the natural language processing for IR area, one into the distributed computing area, while the remaining six are IR papers.

The IRF Conference provides a multi-disciplinary,...

Maya Studio Projects Photorealistic Characters (Autodesk Official Training Guides)
Maya Studio Projects Photorealistic Characters (Autodesk Official Training Guides)

The term photorealistic is thrown around a lot and is often undefined. Although it seems obvious—photorealistic means something looks like a photo—the word requires a greater explanation. There are many facets to photorealism. This is true because as a CG artist, you have control over everything. Achieving 100 percent realism...

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in forensic analysis. I am not an expert in Windows Registry analysis. I am simply, by profession, a responder and analyst with some work and research experience in this area. I have also performed a number...

Sams Teach Yourself Twitter in 10 Minutes
Sams Teach Yourself Twitter in 10 Minutes

Welcome to Twitter, the Social Networking site that was called “utterly devoid of any sort of merit” by New Zealand Herald’s Canvas Magazine, (June 6, 2009) in the same week it appeared on the cover of TIME Magazine as “a powerful form of communication” and “the future of American innovation.”...

Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime
Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime

We all know that society is less than perfect and that crime could easily touch us all. If yon talk to friends and neighbours you will usually find that most of them have cither been the victim of crime or know somebody who has. People tear crime, they feel helpless because they think that there is nothing they can do to protect themselves,...

Algorithmic Number Theory: 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010
Algorithmic Number Theory: 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010

ANTS-IX was the ninth edition of the biennial International Symposium on Algorithmic Number Theory. The first edition of this symposium was held at Cornell University in 1994. ANTS-IX was held July 19-23, 2010 at INRIA in Nancy, France.

The ANTS-IX Program Committee consisted of 12 members whose names are listed on the next...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy