Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Theoretical Aspects of Computer Science: Advanced Lectures (Lecture Notes in Computer Science)
Theoretical Aspects of Computer Science: Advanced Lectures (Lecture Notes in Computer Science)
The First Summer School on Theoretical Aspects on Computer Science was held at the Institute for Studies in Theoretical Physics and Mathematics (IPM) from July 3-10, 2000.

The idea of organizing a summer school was originated during a conversation between the first and the second editor of this volume in the winter
...
Herpes Simplex Virus: Methods and Protocols (Methods in Molecular Biology)
Herpes Simplex Virus: Methods and Protocols (Methods in Molecular Biology)
This second edition volume expands on the previous edition with a discussion of new and updated methods used to study the Herpes Simplex Virus (HSV), along with a look at the latest developing technologies such as next generation sequencing, CRISPR/Cas9 engineering, and the use of BioID to identify protein-protein interactions....
The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
If this book is to succeed and help readers, its cardinal virtue must be to provide
a simple reference text. It should be an essential addition to an information
security library. As such it should also serve the purpose of being a quick
refresher for terms the reader has not seen since the days when one attended a
computing
...
Open Sources: Voices from the Open Source Revolution
Open Sources: Voices from the Open Source Revolution
Open Sources: Voices from the Open Source Revolution is a fascinating look at the raging debate that is its namesake. Filled with writings from the central players--from Linux creator Linus Torvalds to Perl creator Larry Wall--the book convinces the reader of the overwhelming merits of freeing up the many iterations of software's source...
The Zend PHP Certification Practice Test Book - Practice Questions for the Zend Certified Engineer Exam
The Zend PHP Certification Practice Test Book - Practice Questions for the Zend Certified Engineer Exam
As the usage of PHP grows, the need for a globally-recognized credentials program for professional developers is becoming more and more important. The Zend Engineer Certification Program, launched by worldwide PHP leader Zend Technologies, finally creates a professional designation that represents consistently high-quality skills and knowledge in...
Emerging Trends And Challenges in Information Technology Management
Emerging Trends And Challenges in Information Technology Management
Many theoretical development practices exist for creating multimedia systems. Most of these development models are orientated towards building traditional information systems, where the requirements are usually well understood. Multimedia systems, like the industry itself, are evolving rapidly, therefore new tools and techniques are constantly...
Professional ASP.NET 2.0 AJAX (Programmer to Programmer)
Professional ASP.NET 2.0 AJAX (Programmer to Programmer)

Are you ready to build more responsive web applications with richer UI elements? This detailed guide to the Microsoft AJAX Library shows you how to bring together ASP.NET 2.0 with an object-oriented approach to JavaScript development using this new framework from Microsoft. You'll gain an in-depth understanding of the ASP.NET AJAX architecture,...

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab

Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!

Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a...

Digital Design for Computer Data Acquisition
Digital Design for Computer Data Acquisition

This digital electronics text focuses on "how to" design, build, operate and adapt data acquisition systems. The material begins with basic logic gates and ends with a 40 KHz voltage measurer. The approach aims to cover a minimal number of topics in detail. The data acquisition circuits described communicate with a host computer...

OpenAM
OpenAM

OpenAM is an open source continuation of the OpenSSO project that was taken over, and later scrapped, by Oracle. OpenAM is the only commercial-grade, feature-rich web application that provides SSO solutions. It has a variety of features and a powerful Single Sign-On (SSO) capability, but the implementation can be tricky, and the unorganized...

Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Over the last two or three decades, elliptic curves have been playing an increasingly important role both in number theory and in related fields such as cryptography. For example, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality...
CCIE Routing and Switching Exam Certification Guide (3rd Edition)
CCIE Routing and Switching Exam Certification Guide (3rd Edition)
CCIE Routing and Switching Exam Certification Guide, Third Edition, is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCIE Routing and Switching written exam. Senior instructor and best-selling author Wendell Odom shares preparation hints and test-taking tips, helping you identify areas of...
unlimited object storage image
Result Page: 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy