Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Cryptography
Introduction to Cryptography

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Java Performance Tuning
Java Performance Tuning
No matter what language they're programming in, developers always wish things would run faster! Especially when writing mission-critical applications, no one wants to be limited by the programming environment.
Java Performance Tuning provides all the details you need to know to "performance tune" any type of Java program
...
Special Edition Using Java Server Pages and Servlets
Special Edition Using Java Server Pages and Servlets
Special Edition Using JSP and Servlets starts by detailing the evolution of web servers that led to the creation of ASP and JSP. It explains both the limitations of previous technologies and the benefits that JSP provides including platform independence. Includes coverage of: organizing applications with multiple files and client-side objects,...
How to Do Everything with Your Pocket PC and Handheld PC
How to Do Everything with Your Pocket PC and Handheld PC
Take full advantage of all the features your Pocket PC and Handheld PC have to offer with the help from this easy-to-follow guide. Wherever you go, stay up-to-date with your e-mail, appointments, to-do lists, and contact data. Connect to the Internet, create documents using the Pocket Office programs, share information with other handheld devices,...
Solaris 8: The Complete Reference
Solaris 8: The Complete Reference
Clients often ask why we choose Solaris as an operating environment. Is it a decision based on price? Is it an attraction to the latest gizmo features, each with its own four-letter acronym? Do we have a cozy arrangement with Sun Microsystems to promote their operating system? The answer to each of these questions is no, no, NO!  ...
Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
Spatial Analysis, GIS and Remote Sensing: Applications in the Health Sciences
Spatial Analysis, GIS and Remote Sensing: Applications in the Health Sciences
This new book explores the rapidly expanding applications of spatial analysis, GIS and remote sensing in the health sciences, and medical geography. For the practitioner or researcher this book is full of useful techniques if your work applies to environmental and public health, biostatistics, epidemiology, health services, medical geography,...
Electro-Optics Handbook
Electro-Optics Handbook

It’s often difficult to predict which areas of a field will become rejuvenated and grow rapidly or spin off to fit with another to form something new. The field of electro-optics is also unpredictable, but currently it has numerous forces acting on it. First is the development of new optical sources such as ultrafast lasers and fiber...

Serious ADO: Universal Data Access with Visual Basic
Serious ADO: Universal Data Access with Visual Basic

From seasoned developer and trainer Rob Macdonald comes Serious ADO: Universal Data Access with Visual Basic, which teaches experienced Visual Basic developers how to make the most of ADO, Microsoft's flagship product for database access. Serious ADO covers the full range of uses for ADO, from basic use of...

Development of Aneurysms (Nature Conservancy Book)
Development of Aneurysms (Nature Conservancy Book)

The focus of the book, Development of Aneurysms, is a detailed discussion of the biology of aneurysms. Aneurysm formation is influenced by alterations in arterial wall protein synthesis, hemodynamic forces, arterial wall inflammation, and matrix protein degradation. The relationships of these forces provide a unified theory for the...

Inside XML
Inside XML

The XML explosion hardly needs any introduction. It's everywhere and there just seems to be no end to what can be done with XML. While writing to the W3C standards, and keeping up with the pace for corporate implementation, you, the programmer or web developer, will need a comprehensive guide to get you started and show you...

Deploying Windows 2000 with Support Tools
Deploying Windows 2000 with Support Tools
Visually, Windows 2000 is similar to previous versions of Windows. Its extensive new functionality, the overriding goal of which is to reduce an organization's "total cost of ownership," however, makes the system administrator's life easier. This translates to quicker software installation, more efficient management, and easier...
Result Page: Previous 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy