Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity Theft: A Reference Handbook (Contemporary World Issues)
Identity Theft: A Reference Handbook (Contemporary World Issues)

A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.

• Includes a chronology of key decisions, cases, and government action in the development...

Programming in Objective-C 2.0 (2nd Edition) (Developer's Library)
Programming in Objective-C 2.0 (2nd Edition) (Developer's Library)

 

From the author of Programming in C,Programming in Objective-C 2.0 provides the new programmer a complete, step-by-step introduction to the Objective-C language. The book does not assume previous experience with either C or object-oriented programming...

The Disciplinary Frame: Photographic Truths and the Capture of Meaning
The Disciplinary Frame: Photographic Truths and the Capture of Meaning
Photography can seem to capture reality and the eye like no other medium, commanding belief and wielding the power of proof. In some cases, a photograph itself is attributed the force of the real. How can a piece of chemically discolored paper have such potency? How does the meaning of a photograph become fixed? In The Disciplinary Frame,...
The Well-Grounded Rubyist
The Well-Grounded Rubyist
The Well-Grounded Rubyist takes you from interested novice to proficient practitioner. It's a beautifully written tutorial that begins with the basic steps to get your first Ruby program up and running and goes on to explore sophisticated topics like callable objects, reflection, and threading. Whether the topic is simple or tough, the...
Level Sets and Extrema of Random Processes and Fields
Level Sets and Extrema of Random Processes and Fields
Level Sets and Extrema of Random Processes and Fields discusses how to understand the properties of the level sets of paths as well as how to compute the probability distribution of its extremal values, which are two general classes of problems that arise in the study of random processes and fields and in related applications. This book...
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Visual Media Coding and Transmission
Visual Media Coding and Transmission

This book presents the state-of-the-art in visual media coding and transmission

Visual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields of networked audiovisual systems and...

The Doctor in the Victorian Novel
The Doctor in the Victorian Novel

With the character of the doctor as her subject, Tabitha Sparks follows the decline of the marriage plot in the Victorian novel. As Victorians came to terms with the scientific revolution in medicine of the mid-to-late nineteenth century, the novel's progressive distance from the conventions of the marriage plot can be indexed through a rising...

Prediction of Protein Structures, Functions, and Interactions
Prediction of Protein Structures, Functions, and Interactions

The growing flood of new experimental data generated by genome sequencing has provided an impetus for the development of automated methods for predicting the functions of proteins that have been deduced by sequence analysis and lack experimental characterization.

Prediction of Protein Structures, Functions and Interactions presents...

CSS Cookbook, 3rd Edition (Animal Guide)
CSS Cookbook, 3rd Edition (Animal Guide)

What people are saying about CSS Cookbook

"Christopher's fantastic cookbook will give you solutions to pretty much all of the CSS problems you'll come up against in your day-to-day web design work, saving you bags of time and frustration. This guy is one of the industry's brightest minds --...

Multimedia Systems: Algorithms, Standards, and Industry Practices
Multimedia Systems: Algorithms, Standards, and Industry Practices

Multimedia is now a broad “umbrella” that innovatively combines different fields of research and industry to produce practical solutions that are used on a wide scale today. Some of these fields are signal processing, imaging and color science, video and audio analysis, 2D/3D graphics, information theory, compression,...

An Introduction to 3D Computer Vision Techniques and Algorithms
An Introduction to 3D Computer Vision Techniques and Algorithms

Computer vision encompasses the construction of integrated vision systems and the application of vision to problems of real-world importance. The process of creating 3D models is still rather difficult, requiring mechanical measurement of the camera positions or manual alignment of partial 3D views of a scene. However using algorithms, it is...

unlimited object storage image
Result Page: Previous 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy