Home | Amazing | Today | Tags | Publishers | Years | Search 
Parallel and Distributed Processing and Applications: Second International Symposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings
Parallel and Distributed Processing and Applications: Second International Symposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings
This book constitutes the refereed proceedings of the Second International Symposium on Parallel and Distributed Processing and Applications, ISPA 2004, held in Hong Kong, China in December 2004.

The 78 revised full papers and 38 revised short papers presented were carefully reviewed and selected from 361 submissions. The papers are organized...

Parameter Estimation for Scientists and Engineers
Parameter Estimation for Scientists and Engineers
The subject of this book is estimating parameters of expectation models of statistical observations. The book describes what I consider the most important aspects of the subject for applied scientists and engineers. From experience, I know that this group of users is often not aware of estimators other than least squares. Therefore, one of my...
3G Marketing on the Internet, Seventh Edition: Third Generation Internet Marketing Strategies for Online Success
3G Marketing on the Internet, Seventh Edition: Third Generation Internet Marketing Strategies for Online Success
For businesses that are either planning to launch a new e-business or increase the profits of an existing one, this book provides techniques and methods to increase effectiveness and growth. Approaches to viewing a company's foundation introspectively through products, services, branding, target markets, online objectives, and budget are discussed,...
Photographic Lighting Simplified
Photographic Lighting Simplified
"An essential how-to guide." -- Shutterbug

For aspiring photographers ready to transform their work from average to expert, here is the "bible" to lighting any subject and space effectively. In specific but nontechnical terms, Photographic Lighting Simplified explains how to take light
...
Usability Testing for Library Websites: A Hands-On Guide
Usability Testing for Library Websites: A Hands-On Guide
People acquire information from many sources other than libraries. For example, Barnes & Noble, Borders, and Amazon .com sell and distribute books, videos, and CDs and compete for the time and attention of our library’s customers. Barnes & Noble also provides children’s programming and Internet-related classes for families....
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
The first and only guide to one of today’s most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES...
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."

...

Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Wireless Security Essentials: Defending Mobile Systems from Data Piracy
Protect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies

Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,
...
Java Concepts for Java 5 and 6
Java Concepts for Java 5 and 6
Let Cay Horstmann teach you to think like a programmer!

If you really want to master Java, it's not enough to know the code. You must begin to think like a programmer, and in this newest edition of his bestselling guide, Java Concepts, programming guru Cay Horstmann shows you how.

Updated to integrate Java 6,
...
Embedded Systems (World Class Designs)
Embedded Systems (World Class Designs)
"Novice developers will find this book to be invaluable. But more experienced developers will enjoy the breadth and probably pick up a few tricks or insights in less familiar areas." - William Wong, Electronic Design, June 2008

All the design and development inspiration and direction an embedded engineer
...
MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring (Exam Cram)
MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring (Exam Cram)
Welcome to the 70-643 Exam Cram! Whether this book is your first or your 15th Exam Cram series book, you'll find information here that will help ensure your success as you pursue knowledge, experience, and certification. This book aims to help you get ready to take and pass the Microsoft certification exam "TS: Windows Server 2008...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Result Page: 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy