Home | Amazing | Today | Tags | Publishers | Years | Search 
Encyclopedia of Cryptology
Encyclopedia of Cryptology

Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that...

Facebook Me! A Guide to Socializing, Sharing, and Promoting on Facebook (2nd Edition)
Facebook Me! A Guide to Socializing, Sharing, and Promoting on Facebook (2nd Edition)

With more than 500 million active users around the world and still growing steadily, Facebook is more than just another social media site. In the words of author Dave Awl, Facebook is “the new town square”—the place where people gather to discuss the news of the day as well as share what’s going on in their lives. And...

The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1
The Art of Computer Programming, Volume 4A: Combinatorial Algorithms, Part 1

The TITLE of Volume 4 is Combinatorial Algorithms, and when I proposed it I was strongly inclined to add a subtitle: The Kind of Programming I Like Best. Mv editors have decided to tone down such exuberance, but the fact remains that programs with a combinatorial flavor have always been my favorites.

On the other hand I've...

Data Architecture: From Zen to Reality
Data Architecture: From Zen to Reality

First, note that I have used Zen in the title of this book. I have been asked many times why I used such an esoteric term. After all, what is the meaning of Zen? To clarify the meaning of Zen, we must examine the philosophical environment that gave rise to Zen: Indian and Chinese philosophies. In India, Buddhism arose out of a Hindu...

Management 3.0: Leading Agile Developers, Developing Agile Leaders
Management 3.0: Leading Agile Developers, Developing Agile Leaders

I hate management books. I do. People give them to me all the time saying: “You should read this one, it changed my life!” These books are all about 150 pages. They have 14 point type, double-spaced. They have lots of pictures. They have titles like: Open Locker Management, Management by not Managing, First Clean All The...

Encyclopedia of Biometrics (Springer Reference)
Encyclopedia of Biometrics (Springer Reference)

The Encyclopedia of Biometrics provides a comprehensive reference to concepts, technologies, issues, and trends in the field of biometrics. The volume covers all important aspects – research, development, and applications, including biometric sensors and devices, methods and algorithms, sample quality, system design and...

Kengo Kuma: Selected Works
Kengo Kuma: Selected Works

Evanescent. Restrained. Ethereal. These are some of the words used to describe the architecture of Kengo Kuma, one of the most heralded of a new generation of Japanese architects. A recent article in Architecture writes of Kuma that "he strives to give his buildings the qualities of a rainbow, composed of shimmering particles,...

Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the...

Windows Server 2008 Portable Command Guide: MCTS 70-640, 70-642, 70-643, and MCITP 70-646, 70-647
Windows Server 2008 Portable Command Guide: MCTS 70-640, 70-642, 70-643, and MCITP 70-646, 70-647

Thanks for buying the Windows Server 2008 Portable Command Guide: MCTS 70-640, 70-642, 70-643, and MCITP 70-646, 70-647 . I’d love to say that this book was my idea, but the real credit goes to Scott Empson who originally developed the vision of this book with Cisco certifications. I’ve worked with Scott and Pearson...

WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

HTML5: The Missing Manual
HTML5: The Missing Manual

At first glance, you might assume that HTML5 is the fifth version of the HTML web-page-writing language. But the real story is a whole lot messier.

HTML5 is a rebel. It was dreamt up by a loose group of freethinkers who weren’t in charge of the official HTML standard. It allows page-writing practices that...

Making Isometric Social Real-Time Games with HTML5, CSS3, and Javascript
Making Isometric Social Real-Time Games with HTML5, CSS3, and Javascript

Addictive, frustrating. Fun, boring. Engaging, repetitive. Casual, demanding.

These words may contradict each other, but they express the roller coaster of sentiments felt by real-time strategy games players like me. I remember spending countless hours playing brilliant games such as EA/Maxis’s SimCity and SimCity 2000,...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy