Home | Amazing | Today | Tags | Publishers | Years | Search 
Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Adaptive Hypermedia and Adaptive Web-Based Systems: 5th International Conference, AH 2008
Adaptive Hypermedia and Adaptive Web-Based Systems: 5th International Conference, AH 2008

Adaptive Hypermedia has emerged as an important area of both academic and deployed research. It encompasses a broad range of research that will enable personalized, adaptive hypermedia systems to play an even more effective role in people’s lives. The Web has enabled the widespread use of many personalized systems, such as recommenders,...

Pro Oracle Database 11g Administration (Expert's Voice in Oracle)
Pro Oracle Database 11g Administration (Expert's Voice in Oracle)

Pro Oracle Database 11g Administration is a book focused on results. Author Darl Kuhn draws from a well of experience over a decade deep to lay out real-world techniques that lead to success as an Oracle DBA. He gives clear explanations on how to perform critical tasks. He weaves in theory where necessary without...

Pro WPF and Silverlight MVVM: Effective Application Development with Model-View-ViewModel
Pro WPF and Silverlight MVVM: Effective Application Development with Model-View-ViewModel

WPF and Silverlight are unlike any other user interface (UI) technologies. They have been built to a new paradigm that—if harnessed correctly—can yield unprecedented power and performance. This book shows you how to control that power to produce clean, testable, maintainable code.

It is now recognized that any
...

Managing Open Source Projects: A Wiley Tech Brief
Managing Open Source Projects: A Wiley Tech Brief

The only guide to managing and integrating the open source model

With the phenomenal success of Linux, companies are taking open source business solutions much more seriously than ever before. This book helps to satisfy the growing demand for guidance on how to manage open source enterprise development projects. Expert Jan Sandred...

News 2.0 Can journalism survive the Internet?
News 2.0 Can journalism survive the Internet?

The bulk of this book was written over a period of two years between the middle of 2008 and April 2010. In that time the world’s media systems were caught up in a massive vortex of uncertainty and change. News 2.0 captures the flavour of that period and sets it against an historical background. In short: Where did the news media’s...

The Global M&A Tango: How to Reconcile Cultural Differences in Mergers, Acquisitions, and Strategic Partnerships
The Global M&A Tango: How to Reconcile Cultural Differences in Mergers, Acquisitions, and Strategic Partnerships

In our rapidly expanding and increasingly volatile global economy, mergers and acquisitions are becoming the strategy of choice for businesses seeking to stimulate growth while managing risk. As more and more M&A deals are struck between global organizations, difficult new issues involving cultural differences have arisen.

In...

Bonding with Your Dog: A Trainer's Secrets for Building a Better Relationship
Bonding with Your Dog: A Trainer's Secrets for Building a Better Relationship

The human-canine bond: a relationship steeped in love with equal parts mutual respect, trust, and regard

In this groundbreaking book, professional dog trainer Victoria Schade reveals that a successful relationship between you and your dog isn't about establishing yourself as the pack leader, but about building a...

Macs For Dummies
Macs For Dummies

What an amazing time to get to know the Mac. For years these elegantly designed computers have been a model of simplicity and virus-free stability. But that’s never stopped Apple from making these machines even harder to resist by applying stunning changes.

Consider Apple’s seismic embrace of Intel a few years...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

Clout: The Art and Science of Influential Web Content (Voices That Matter)
Clout: The Art and Science of Influential Web Content (Voices That Matter)

The web is all about action verbs. We click. We search. We navigate. We make choices. Alone among other forms of media, we’re the ones who control our experience.

When organizations try to connect with their customers online, one of the first things they always want to know is “how can we get our users to do...

Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift—intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy