Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
Efficient Algorithms for Listing Combinatorial Structures (Distinguished Dissertations in Computer Science)
Efficient Algorithms for Listing Combinatorial Structures (Distinguished Dissertations in Computer Science)

This thesis is concerned with the design of efficient algorithms for listing combinatorial structures. The research described here gives some answers to the following questions: which families of combinatorial structures have fast computer algorithms for listing their members, What general methods are useful for listing combinatorial...

Heidegger with Derrida: Being Written
Heidegger with Derrida: Being Written

Heidegger with Derrida: Being Written attempts, for the first time, to think Heidegger's philosophy through the lens of Derrida's logocentric thesis, according to which speech has, throughout the history of metaphysics, been given primacy over writing. The book offers a detailed account of Derrida's arguments about...

John Locke's Politics of Moral Consensus
John Locke's Politics of Moral Consensus
‘… The book is written in a very accessible and often … punchy way … In its overall thesis that liberalism requires a moral/religious underpinning, the book is very interesting and stimulating.’ Roger Woolhouse, University of York

'… engaging and thought-provoking … To the scholar of Locke,
...
Spring Web Flow 2 Web Development
Spring Web Flow 2 Web Development

Many web applications need to take the user through a defined series of steps such as e-commerce checkouts or user registrations. Spring Web Flow works well for rich and flexible user interaction, additionally it helps you to describe the flow of websites in complex processes. Spring Web Flow 2 provides the perfect way to build these kinds of...

Professional Windows PowerShell (Programmer to Programmer)
Professional Windows PowerShell (Programmer to Programmer)
Professional Windows® PowerShell

Forget everything you know about the Windows command line because you're about to enter a whole new ballgame. Windows PowerShell provides a new environment for interactive exploration and administration of Windows machines that's different from and more consistent than what you've previously used on Windows...

Blog Theory: Feedback and Capture in the Circuits of Drive
Blog Theory: Feedback and Capture in the Circuits of Drive

The challenge of this book is thinking critically about media practices in a setting where they are fast, fun, and ubiquitous. As an avowedly engaged and political approach to thought, critical theory of any sort encounters challenges. Attempting to analyze and intervene in the present, it nonetheless adopts a backward gaze, an idea G.W.F....

Fundamental Numerical Methods for Electrical Engineering (Lecture Notes in Electrical Engineering)
Fundamental Numerical Methods for Electrical Engineering (Lecture Notes in Electrical Engineering)
Stormy development of electronic computation techniques (computer systems and software), observed during the last decades, has made possible automation of data processing in many important human activity areas, such as science, technology, economics and labor organization. In a broadly understood technology area, this development led to separation...
A PhD Is Not Enough!: A Guide to Survival in Science
A PhD Is Not Enough!: A Guide to Survival in Science

Despite your graduate education, brainpower, and technical prowess, your career in scientific research is far from assured. Permanent positions are scarce, science survival is rarely part of formal graduate training, and a good mentor is hard to find.

In A Ph.D. Is Not Enough!, physicist Peter J. Feibelman lays...

Introduction to Design Patterns in C++ with Qt (2nd Edition)
Introduction to Design Patterns in C++ with Qt (2nd Edition)

I still remember how I first got to know C++ and Qt. It was around 15 years ago while working on my diploma thesis. Most of the development we did at that time was done in Fortran and C. I was working on a Linux system with FVWM as a window manager. One day I read an article about KDE—a cool, new open source project...

Research Methodology in Marketing: Theory Development, Empirical Approaches and Philosophy of Science Considerations
Research Methodology in Marketing: Theory Development, Empirical Approaches and Philosophy of Science Considerations
This textbook describes and explains the fundamentals of applying empirical methods for theory building and theory testing in marketing research. The authors explain the foundations in philosophy of science and the various methodological approaches to readers who are working empirically with the purpose of developing and testing...
Programming Interviews Exposed: Secrets to Landing Your Next Job (Programmer to Programmer)
Programming Interviews Exposed: Secrets to Landing Your Next Job (Programmer to Programmer)

The pressure is on during the interview process but with the right preparation, you can walk away with your dream job. This classic book uncovers what interviews are really like at America's top software and computer companies and provides you with the tools to succeed in any situation. The authors take you step-by-step through new problems and...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy