Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
The Common Language Infrastructure Annotated Standard
The Common Language Infrastructure Annotated Standard

The Common Language Infrastructure Annotated Standard is the definitive guide to understanding the annotated specification for the Common Language Infrastructure (CLI) standard. With annotations and code samples from both the ECMA standards committee and the Microsoft Common Language Runtime (CLR) team, this book goes...

Microsoft Office XP Inside Out
Microsoft Office XP Inside Out

This book is written for the power user, the software enthusiast, the consultant, the solutions developer, or the company guru—the one others come to for help. It's designed for the person who wants to learn the essentials quickly and then go on to more interesting topics—advanced timesaving techniques, bug workarounds,...

Mac OS X for Unix Geeks
Mac OS X for Unix Geeks
If you're one of the many Unix developers drawn to Mac OS X for its BSD core, you'll find yourself in surprisingly unfamiliar territory. Even if you're an experienced Mac user, Mac OS X is unlike earlier Macs, and it's radically different from the Unix you've used before, too.

Enter "Mac OS X for Unix Geeks" by Brian Jepson and...

GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
"This is a strong author team and they have produced a much-needed and timely book"
--Bruce Davie, Cisco Fellow

"GMPLS technology provides a keystone for next generation integrated optical networks, and this book is the one-stop reference on the subject."
--Kireeti Kompella, Juniper Networks and CCAMP
...
RFID for the Optimization of Business Processes
RFID for the Optimization of Business Processes
Prof. Elgar Fleisch, ETH Zürich and University of St. Gallen:

"A comprehensive, clear and practical introduction for RFID designers."

Prof. Rolf Jansen, Faculty of Logistics, Dortmund University:

"The book comprehensively deals with the topic in a solution-oriented way, expertly conveying...

Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)
Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series)

Even bad code can function. But if code isn’t clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn’t have to be that way.

Noted software expert Robert C. Martin presents a revolutionary paradigm with
...

Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice provides a detailed analysis of new imaging and pattern recognition techniques for the understanding and deployment of biometrics and forensic techniques as practical solutions to increase security. It contains a collection of the recent advances in the technology ranging from...
Interconnecting Smart Objects with IP: The Next Internet
Interconnecting Smart Objects with IP: The Next Internet

Smart object technology, sometimes called the Internet of Things, is having a profound impact on our day-to-day lives. Interconnecting Smart Objects with IP is the first book that takes a holistic approach to the revolutionary area of IP-based smart objects. Smart objects are the intersection of networked embedded systems, wireless...

The Definitive Guide to Interwoven TeamSite (Definitive Guides)
The Definitive Guide to Interwoven TeamSite (Definitive Guides)

Adigital flood is upon us. Content inundates us. It begins as bits of content swirling everywhere—a document, an image, a written corporate procedure, a web page, or an email. The binary mist mixes, combines, and rains down on us. It pools in laptops, on desktops, and in server farms. Creeks and streams meander to corporate reservoirs....

Fundamentals of Predictive Text Mining (Texts in Computer Science)
Fundamentals of Predictive Text Mining (Texts in Computer Science)

Five years ago, we authored “Text Mining: Predictive Methods for Analyzing Unstructured Information.” That book was geared mostly to professional practitioners, but was adaptable to course work with some effort by the instructor. Many topics were evolving, and this was one of the earliest efforts to collect material for predictive...

Dependability of Networked Computer-based Systems (Springer Series in Reliability Engineering)
Dependability of Networked Computer-based Systems (Springer Series in Reliability Engineering)

This book is meant for research scholars, scientists and practitioners involved with the application of computer-based systems in critical applications. Ensuring dependability of systems used in critical applications is important due to the impact of their failures on human life, investment and environment. The individual aspects of...

unlimited object storage image
Result Page: 523 522 521 520 519 518 517 516 515 514 513 512 511 510 509 508 507 506 505 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy