Home | Amazing | Today | Tags | Publishers | Years | Search 
Net Locality: Why Location Matters in a Networked World
Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk with crowds of anonymous people. He sees skyscrapers and signage extending to the horizon. There is a lot going on – people talking, walking, playing, fighting, screaming, driving, and smiling. He sees a coffee shop that excites his interest. He pulls...
Knowledge Discovery and Data Mining. Current Issues and New Applications: Current Issues and New Applications
Knowledge Discovery and Data Mining. Current Issues and New Applications: Current Issues and New Applications
The Fourth Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2000) was held at the Keihanna-Plaza, Kyoto, Japan, April 18 - 20, 2000. PAKDD 2000 provided an international forum for researchers and application developers to share their original research results and practical development experiences. A wide...
Recommender Systems for the Social Web (Intelligent Systems Reference Library, Vol. 32)
Recommender Systems for the Social Web (Intelligent Systems Reference Library, Vol. 32)
The emergence and deployment of new digital communication technologies (3G mobile networks, digital television, xDSL, home automation networks, etc.) has led to a gradual increase in speed while a steady decline in prices at Internet connections. Moreover, since much longer ago, the continuing advances in electronic technology...
The PHP Playbook
The PHP Playbook
The finest schools and best programming books in the world offer a plethora of information about how to string bits of code together into elegant applications and programs. They discuss grand theories of operation, talk about design patterns on a conceptual and enterprise-level field, and teach us the syntax, idiosyncrasies and, in...
iPod: The Missing Manual
iPod: The Missing Manual
What a difference a decade makes. When Apple introduced the very first iPod back in October 2001, it was a bulky chunk of white plastic, chrome, and glass that held a mere 5 gigabytes of music. But its concept was simple and enticing: you could carry 1,000 songs around in your pocket. And people did.
 
Fundamentals of Database Management Systems
Fundamentals of Database Management Systems
A course in database management has become well established as a required course in both undergraduate and graduate management information systems degree programs. This is as it should be, considering the central position of the database field in the information systems environment. Indeed, a solid understanding of the...
ActionScript Developer's Guide to PureMVC
ActionScript Developer's Guide to PureMVC

Too often in the development of a large application, the developer must stop and think about where to find some class he needs, where some new class should go, and how to wire them up in such a way that gets data from wherever it lives to a display so the user can interact with it or vice-versa.

Automated Deduction in Geometry: 8th International Workshop, ADG 2010, Munich, Germany
Automated Deduction in Geometry: 8th International Workshop, ADG 2010, Munich, Germany

From July 22 to July 24, 2010, the Technische Universit¨at M¨unchen, Germany, hosted the eighth edition of the now well-established ADG workshop dedicated to Automatic Deduction in Geometry. From the first edition, which was held in Toulouse in 1996, to ADG 2010, a slow mutation has taken place. The workshop that was formerly...

Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime
Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime

We all know that society is less than perfect and that crime could easily touch us all. If yon talk to friends and neighbours you will usually find that most of them have cither been the victim of crime or know somebody who has. People tear crime, they feel helpless because they think that there is nothing they can do to protect themselves,...

Sams Teach Yourself Twitter in 10 Minutes
Sams Teach Yourself Twitter in 10 Minutes

Welcome to Twitter, the Social Networking site that was called “utterly devoid of any sort of merit” by New Zealand Herald’s Canvas Magazine, (June 6, 2009) in the same week it appeared on the cover of TIME Magazine as “a powerful form of communication” and “the future of American innovation.”...

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in forensic analysis. I am not an expert in Windows Registry analysis. I am simply, by profession, a responder and analyst with some work and research experience in this area. I have also performed a number...

Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy