Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Dynamic and Mobile GIS: Investigating Changes in Space and Time (Innovations in Gis)
Dynamic and Mobile GIS: Investigating Changes in Space and Time (Innovations in Gis)
Like Stan Openshaw (1998) in the foreword to the ‘Innovations in GIS 5’, I have never been asked to write a foreword before, and also like him I am concerned that after you read this one (and who reads forewords anyway?) I may never be invited again. But, as readers of this foreword will be probably be sparse and perhaps limited to the...
Indirect Searches for New Physics
Indirect Searches for New Physics

This is the first book to discuss the search for new physics in charged leptons, neutrons, and quarks in one coherent volume. The area of indirect searches for new physics is highly topical; though no new physics particles have yet been observed directly at the Large Hadron Collider at CERN, the methods described in this book will...

Algorithms, Architectures and Information Systems Security (Statistical Science and Interdisciplinary Research: Platinum Jubilee)
Algorithms, Architectures and Information Systems Security (Statistical Science and Interdisciplinary Research: Platinum Jubilee)
This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface...
Web 2.0: The Business Model
Web 2.0: The Business Model
Web 2.0 is one of the most prominent business models for information systems available today. It brings together technology and social networks, and the interactivity that creates business value.

Web 2.0: The Business Model, an edited volume, is the first reference that integrates the business implications of Web 2.0/3.0, along...

HTTP: The Definitive Guide
HTTP: The Definitive Guide
Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration.

While the basics of HTTP are elegantly
...
Multi-Mode / Multi-Band RF Transceivers for Wireless Communications: Advanced Techniques, Architectures, and Trends
Multi-Mode / Multi-Band RF Transceivers for Wireless Communications: Advanced Techniques, Architectures, and Trends
Current and future mobile terminals become increasingly complex because they have to deal with a variety of frequency bands and communication standards. Achieving multi-band/multi-mode functionality is especially challenging for the radio frequency (RF)-transceiver section, due to limitations in terms of frequency-agile RF components...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Managing and Mining Graph Data (Advances in Database Systems)
Managing and Mining Graph Data (Advances in Database Systems)

Managing and Mining Graph Data is a comprehensive survey book in graph data analytics. It contains extensive surveys on important graph topics such as graph languages, indexing, clustering, data generation, pattern mining, classification, keyword search, pattern matching, and privacy. It also studies a number of domain-specific...

Foundations of Modern Physics
Foundations of Modern Physics
In addition to his ground-breaking research, Nobel Laureate Steven Weinberg is known for a series of highly praised texts on various aspects of physics, combining exceptional physical insight with his gift for clear exposition. Describing the foundations of modern physics in their historical context and with some new derivations, Weinberg...
Secure Communicating Systems: Design, Analysis, and Implementation
Secure Communicating Systems: Design, Analysis, and Implementation
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical...
The Routledge Handbook of the Philosophy and Science of Punishment (Routledge Handbooks in Philosophy)
The Routledge Handbook of the Philosophy and Science of Punishment (Routledge Handbooks in Philosophy)

Philosophers, legal scholars, criminologists, psychiatrists, and psychologists have long asked important questions about punishment: What is its purpose? What theories help us better understand its nature? Is punishment just? Are there effective alternatives to punishment? How can empirical data from the sciences help us better...

Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services

Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there. 

However, more experienced Linux users can begin with this volume and download an...

unlimited object storage image
Result Page: 307 306 305 304 303 302 301 300 299 298 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy