Home | Amazing | Today | Tags | Publishers | Years | Search 
Weaving a Library Web: A Guide to Developing Children's Websites
Weaving a Library Web: A Guide to Developing Children's Websites
We have entered a digital age in which preschoolers can handle a mouse better than a crayon. In this digital world children want to interact with information, not just receive it. Technology is as ordinary to them as television and radio were to previous generations. Computers and the Internet provide them with information and entertainment,...
Global Distributed Applications With Windows DNA (Artech House Computing Library)
Global Distributed Applications With Windows DNA (Artech House Computing Library)
Provides a full description of the Microsoft Windows Distributed Internet Applications Architecture (DNA), its purpose, and its proper use for Internet applications development. DLC: Microsoft Windows (Computer file).

Welcome to Global Distributed Applications With Windows DNA. You have probably made a number of assumptions simply by
...
The Spreadsheet at 25: 25 Amazing Excel Examples that Evolved from the Invention that Changed the World
The Spreadsheet at 25: 25 Amazing Excel Examples that Evolved from the Invention that Changed the World
From the 1979 invention by two MIT students of the visible calculator to the war between Lotus and Microsoft for dominance in the spreadsheet market, this book is a fascinating look at the software application that helped spur the entire computer industry. This loving look back at the early computer and technology evolution will teach anyone...
Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
Basics of Contemporary Cryptography for IT Practitioners
Basics of Contemporary Cryptography for IT Practitioners
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques...
Steiner Tree Problems In Computer Communication Networks
Steiner Tree Problems In Computer Communication Networks
The Steiner tree problem is one of the most important combinatorial optimization problems. It has a long history that can be traced back to the famous mathematician Fermat (1601 1665). This book studies three significant breakthroughs on the Steiner tree problem that were achieved in the 1990s, and some important applications of Steiner tree...
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications...
Advances in Chinese Spoken Language Processing
Advances in Chinese Spoken Language Processing
After decades of research activity, Chinese spoken language processing (CSLP) has advanced considerably both in practical technology and theoretical discovery. In this book, the editors provide both an introduction to the field as well as unique research problems with their solutions in various areas of CSLP. The contributions represent pioneering...
Applied Artificial Intelligence
Applied Artificial Intelligence
FLINS, originally an acronym for Fuzzy Logic and Intelligent Technologies in Nuclear Science, is now extended to Applied Artificial Intelligence for Applied Research. The contributions to the seventh in the series of FLINS conferences contained in this volume cover state-of-the-art research and development in applied artificial intelligence for...
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
Fundamentals of Applied Probability and Random Processes
Fundamentals of Applied Probability and Random Processes
"Each chapter is broken down into small subunits, making this a useful reference book as well as a textbook. The material is presented clearly, and solved problems are included in the text." --MAA Reviews

Provides aspiring engineers with a solid introduction to probability theory and stochastic processes

...
46 Science Fair Projects for the Evil Genius
46 Science Fair Projects for the Evil Genius
SHAKE UP YOUR SCIENCE FAIR WITH THESE CUTTING-EDGE, ATTENTION-GRABBING PROJECTS!

Want to win first place in the next science fair? 46 Science Fair Projects for the Evil Genius has everything you need to create amazing, sophisticated projects that will wow the judges and keep everyone talking long after the awards are...

Result Page: 865 864 863 862 861 860 859 858 857 856 855 854 853 852 851 850 849 848 847 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy